[
  {
    "path": ".gitattributes",
    "content": "*.json text\n"
  },
  {
    "path": "CNAME",
    "content": "fuzzing-survey.org\n"
  },
  {
    "path": "CONTRIBUTING.md",
    "content": "# Contribution Guideline\n\nPlease read this guideline before creating a pull request (PR) or an issue on\nthis repository.\n\n## Inclusion Criteria\n\nIn order to ensure the quality of our database and to keep the genealogy graph\nsimple, we adopt the inclusion criteria we used in our survey. For a conference\npaper, it should have been published in one of the following top-tier venues:\n\n* ASE\n* CCS\n* FSE\n* ICSE\n* NDSS\n* PLDI\n* S&P\n* USENIX Security\n\nFor an open-sourced tool, it should either have gathered at least 100 stars in\nGitHub/GitLab or have been presented at Black Hat or DefCon. We do *not* include\npapers that present only theoretical aspects without implementing a fuzzing tool\nbecause this database is about the lineage of fuzzing tools. For example, our\n[survey](https://ieeexplore.ieee.org/document/8863940) itself should not be\nincluded in this database.\n\n## Git Commit Messages\n\nWe follow the convention described in [this\narticle](https://chris.beams.io/posts/git-commit/).\n\n## Adding a New Fuzzer\n\nThe database is stored in [`/data/fuzzers.json`](/data/fuzzers.json) using the\nfollowing schema. The **required** fields of each entry are:\n\n- `name`: The name of this fuzzer. This is the key by which this fuzzer is\n  referred to and must be *unique*.\n\n- `year`: The year when this fuzzer was published.\n\n- `targets`: The supported targets of this fuzzer. Examples include `file`,\n  `network`, `kernel`, `argument`, etc.\n\n- `color`: The degree of instrumentation of this fuzzer---blackbox, greybox, or\n  whitebox.\n\n- `references`: The `name`(s) of highly-related fuzzers, meaning other fuzzers\n  that this fuzzer was implemented on top of or was heavily inspired by. To\n  maintain simplicity, we limit this field to **two** entries in our database.\n\nThe following fields are *optional*, but please try to provide as much\ninformation as possible:\n\n- `author`: The author(s) of this fuzzer. When possible, please spell the *full\n  name(s)* and not just the initials.\n\n- `toolurl`: A URL to the source (preferred) or the executable of this fuzzer.\n\n- `title`: The title of the conference publication/talk or the journal\n  publication that presented this fuzzer.\n\n- `booktitle`: The book title of the conference proceedings if this fuzzer first\n  appeared at a conference.\n\n- `journal`, `volume`, `number`: The journal title, volume, and number of the\n  publication if this fuzzer first appeared in a journal.\n\n- `miscurl`: Miscellaneous links, e.g., URLs to papers or presentations.\n\n- `keywords`: Extra keywords describing this fuzzer. Make the list as concise as\n  possible.\n\n## Basic Rules for JSON\n\n- For effective version control, please format `/data/fuzzers.json` with the\n  following [`jq`](https://stedolan.github.io/jq/) command:\n  ```\n  jq \"sort_by(.name)\" fuzzers.json\n  ```\n"
  },
  {
    "path": "COPYING.md",
    "content": "                    GNU GENERAL PUBLIC LICENSE\r\n                       Version 3, 29 June 2007\r\n\r\n Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>\r\n Everyone is permitted to copy and distribute verbatim copies\r\n of this license document, but changing it is not allowed.\r\n\r\n                            Preamble\r\n\r\n  The GNU General Public License is a free, copyleft license for\r\nsoftware and other kinds of works.\r\n\r\n  The licenses for most software and other practical works are designed\r\nto take away your freedom to share and change the works.  By contrast,\r\nthe GNU General Public License is intended to guarantee your freedom to\r\nshare and change all versions of a program--to make sure it remains free\r\nsoftware for all its users.  We, the Free Software Foundation, use the\r\nGNU General Public License for most of our software; it applies also to\r\nany other work released this way by its authors.  You can apply it to\r\nyour programs, too.\r\n\r\n  When we speak of free software, we are referring to freedom, not\r\nprice.  Our General Public Licenses are designed to make sure that you\r\nhave the freedom to distribute copies of free software (and charge for\r\nthem if you wish), that you receive source code or can get it if you\r\nwant it, that you can change the software or use pieces of it in new\r\nfree programs, and that you know you can do these things.\r\n\r\n  To protect your rights, we need to prevent others from denying you\r\nthese rights or asking you to surrender the rights.  Therefore, you have\r\ncertain responsibilities if you distribute copies of the software, or if\r\nyou modify it: responsibilities to respect the freedom of others.\r\n\r\n  For example, if you distribute copies of such a program, whether\r\ngratis or for a fee, you must pass on to the recipients the same\r\nfreedoms that you received.  You must make sure that they, too, receive\r\nor can get the source code.  And you must show them these terms so they\r\nknow their rights.\r\n\r\n  Developers that use the GNU GPL protect your rights with two steps:\r\n(1) assert copyright on the software, and (2) offer you this License\r\ngiving you legal permission to copy, distribute and/or modify it.\r\n\r\n  For the developers' and authors' protection, the GPL clearly explains\r\nthat there is no warranty for this free software.  For both users' and\r\nauthors' sake, the GPL requires that modified versions be marked as\r\nchanged, so that their problems will not be attributed erroneously to\r\nauthors of previous versions.\r\n\r\n  Some devices are designed to deny users access to install or run\r\nmodified versions of the software inside them, although the manufacturer\r\ncan do so.  This is fundamentally incompatible with the aim of\r\nprotecting users' freedom to change the software.  The systematic\r\npattern of such abuse occurs in the area of products for individuals to\r\nuse, which is precisely where it is most unacceptable.  Therefore, we\r\nhave designed this version of the GPL to prohibit the practice for those\r\nproducts.  If such problems arise substantially in other domains, we\r\nstand ready to extend this provision to those domains in future versions\r\nof the GPL, as needed to protect the freedom of users.\r\n\r\n  Finally, every program is threatened constantly by software patents.\r\nStates should not allow patents to restrict development and use of\r\nsoftware on general-purpose computers, but in those that do, we wish to\r\navoid the special danger that patents applied to a free program could\r\nmake it effectively proprietary.  To prevent this, the GPL assures that\r\npatents cannot be used to render the program non-free.\r\n\r\n  The precise terms and conditions for copying, distribution and\r\nmodification follow.\r\n\r\n                       TERMS AND CONDITIONS\r\n\r\n  0. Definitions.\r\n\r\n  \"This License\" refers to version 3 of the GNU General Public License.\r\n\r\n  \"Copyright\" also means copyright-like laws that apply to other kinds of\r\nworks, such as semiconductor masks.\r\n\r\n  \"The Program\" refers to any copyrightable work licensed under this\r\nLicense.  Each licensee is addressed as \"you\".  \"Licensees\" and\r\n\"recipients\" may be individuals or organizations.\r\n\r\n  To \"modify\" a work means to copy from or adapt all or part of the work\r\nin a fashion requiring copyright permission, other than the making of an\r\nexact copy.  The resulting work is called a \"modified version\" of the\r\nearlier work or a work \"based on\" the earlier work.\r\n\r\n  A \"covered work\" means either the unmodified Program or a work based\r\non the Program.\r\n\r\n  To \"propagate\" a work means to do anything with it that, without\r\npermission, would make you directly or secondarily liable for\r\ninfringement under applicable copyright law, except executing it on a\r\ncomputer or modifying a private copy.  Propagation includes copying,\r\ndistribution (with or without modification), making available to the\r\npublic, and in some countries other activities as well.\r\n\r\n  To \"convey\" a work means any kind of propagation that enables other\r\nparties to make or receive copies.  Mere interaction with a user through\r\na computer network, with no transfer of a copy, is not conveying.\r\n\r\n  An interactive user interface displays \"Appropriate Legal Notices\"\r\nto the extent that it includes a convenient and prominently visible\r\nfeature that (1) displays an appropriate copyright notice, and (2)\r\ntells the user that there is no warranty for the work (except to the\r\nextent that warranties are provided), that licensees may convey the\r\nwork under this License, and how to view a copy of this License.  If\r\nthe interface presents a list of user commands or options, such as a\r\nmenu, a prominent item in the list meets this criterion.\r\n\r\n  1. Source Code.\r\n\r\n  The \"source code\" for a work means the preferred form of the work\r\nfor making modifications to it.  \"Object code\" means any non-source\r\nform of a work.\r\n\r\n  A \"Standard Interface\" means an interface that either is an official\r\nstandard defined by a recognized standards body, or, in the case of\r\ninterfaces specified for a particular programming language, one that\r\nis widely used among developers working in that language.\r\n\r\n  The \"System Libraries\" of an executable work include anything, other\r\nthan the work as a whole, that (a) is included in the normal form of\r\npackaging a Major Component, but which is not part of that Major\r\nComponent, and (b) serves only to enable use of the work with that\r\nMajor Component, or to implement a Standard Interface for which an\r\nimplementation is available to the public in source code form.  A\r\n\"Major Component\", in this context, means a major essential component\r\n(kernel, window system, and so on) of the specific operating system\r\n(if any) on which the executable work runs, or a compiler used to\r\nproduce the work, or an object code interpreter used to run it.\r\n\r\n  The \"Corresponding Source\" for a work in object code form means all\r\nthe source code needed to generate, install, and (for an executable\r\nwork) run the object code and to modify the work, including scripts to\r\ncontrol those activities.  However, it does not include the work's\r\nSystem Libraries, or general-purpose tools or generally available free\r\nprograms which are used unmodified in performing those activities but\r\nwhich are not part of the work.  For example, Corresponding Source\r\nincludes interface definition files associated with source files for\r\nthe work, and the source code for shared libraries and dynamically\r\nlinked subprograms that the work is specifically designed to require,\r\nsuch as by intimate data communication or control flow between those\r\nsubprograms and other parts of the work.\r\n\r\n  The Corresponding Source need not include anything that users\r\ncan regenerate automatically from other parts of the Corresponding\r\nSource.\r\n\r\n  The Corresponding Source for a work in source code form is that\r\nsame work.\r\n\r\n  2. Basic Permissions.\r\n\r\n  All rights granted under this License are granted for the term of\r\ncopyright on the Program, and are irrevocable provided the stated\r\nconditions are met.  This License explicitly affirms your unlimited\r\npermission to run the unmodified Program.  The output from running a\r\ncovered work is covered by this License only if the output, given its\r\ncontent, constitutes a covered work.  This License acknowledges your\r\nrights of fair use or other equivalent, as provided by copyright law.\r\n\r\n  You may make, run and propagate covered works that you do not\r\nconvey, without conditions so long as your license otherwise remains\r\nin force.  You may convey covered works to others for the sole purpose\r\nof having them make modifications exclusively for you, or provide you\r\nwith facilities for running those works, provided that you comply with\r\nthe terms of this License in conveying all material for which you do\r\nnot control copyright.  Those thus making or running the covered works\r\nfor you must do so exclusively on your behalf, under your direction\r\nand control, on terms that prohibit them from making any copies of\r\nyour copyrighted material outside their relationship with you.\r\n\r\n  Conveying under any other circumstances is permitted solely under\r\nthe conditions stated below.  Sublicensing is not allowed; section 10\r\nmakes it unnecessary.\r\n\r\n  3. Protecting Users' Legal Rights From Anti-Circumvention Law.\r\n\r\n  No covered work shall be deemed part of an effective technological\r\nmeasure under any applicable law fulfilling obligations under article\r\n11 of the WIPO copyright treaty adopted on 20 December 1996, or\r\nsimilar laws prohibiting or restricting circumvention of such\r\nmeasures.\r\n\r\n  When you convey a covered work, you waive any legal power to forbid\r\ncircumvention of technological measures to the extent such circumvention\r\nis effected by exercising rights under this License with respect to\r\nthe covered work, and you disclaim any intention to limit operation or\r\nmodification of the work as a means of enforcing, against the work's\r\nusers, your or third parties' legal rights to forbid circumvention of\r\ntechnological measures.\r\n\r\n  4. Conveying Verbatim Copies.\r\n\r\n  You may convey verbatim copies of the Program's source code as you\r\nreceive it, in any medium, provided that you conspicuously and\r\nappropriately publish on each copy an appropriate copyright notice;\r\nkeep intact all notices stating that this License and any\r\nnon-permissive terms added in accord with section 7 apply to the code;\r\nkeep intact all notices of the absence of any warranty; and give all\r\nrecipients a copy of this License along with the Program.\r\n\r\n  You may charge any price or no price for each copy that you convey,\r\nand you may offer support or warranty protection for a fee.\r\n\r\n  5. Conveying Modified Source Versions.\r\n\r\n  You may convey a work based on the Program, or the modifications to\r\nproduce it from the Program, in the form of source code under the\r\nterms of section 4, provided that you also meet all of these conditions:\r\n\r\n    a) The work must carry prominent notices stating that you modified\r\n    it, and giving a relevant date.\r\n\r\n    b) The work must carry prominent notices stating that it is\r\n    released under this License and any conditions added under section\r\n    7.  This requirement modifies the requirement in section 4 to\r\n    \"keep intact all notices\".\r\n\r\n    c) You must license the entire work, as a whole, under this\r\n    License to anyone who comes into possession of a copy.  This\r\n    License will therefore apply, along with any applicable section 7\r\n    additional terms, to the whole of the work, and all its parts,\r\n    regardless of how they are packaged.  This License gives no\r\n    permission to license the work in any other way, but it does not\r\n    invalidate such permission if you have separately received it.\r\n\r\n    d) If the work has interactive user interfaces, each must display\r\n    Appropriate Legal Notices; however, if the Program has interactive\r\n    interfaces that do not display Appropriate Legal Notices, your\r\n    work need not make them do so.\r\n\r\n  A compilation of a covered work with other separate and independent\r\nworks, which are not by their nature extensions of the covered work,\r\nand which are not combined with it such as to form a larger program,\r\nin or on a volume of a storage or distribution medium, is called an\r\n\"aggregate\" if the compilation and its resulting copyright are not\r\nused to limit the access or legal rights of the compilation's users\r\nbeyond what the individual works permit.  Inclusion of a covered work\r\nin an aggregate does not cause this License to apply to the other\r\nparts of the aggregate.\r\n\r\n  6. Conveying Non-Source Forms.\r\n\r\n  You may convey a covered work in object code form under the terms\r\nof sections 4 and 5, provided that you also convey the\r\nmachine-readable Corresponding Source under the terms of this License,\r\nin one of these ways:\r\n\r\n    a) Convey the object code in, or embodied in, a physical product\r\n    (including a physical distribution medium), accompanied by the\r\n    Corresponding Source fixed on a durable physical medium\r\n    customarily used for software interchange.\r\n\r\n    b) Convey the object code in, or embodied in, a physical product\r\n    (including a physical distribution medium), accompanied by a\r\n    written offer, valid for at least three years and valid for as\r\n    long as you offer spare parts or customer support for that product\r\n    model, to give anyone who possesses the object code either (1) a\r\n    copy of the Corresponding Source for all the software in the\r\n    product that is covered by this License, on a durable physical\r\n    medium customarily used for software interchange, for a price no\r\n    more than your reasonable cost of physically performing this\r\n    conveying of source, or (2) access to copy the\r\n    Corresponding Source from a network server at no charge.\r\n\r\n    c) Convey individual copies of the object code with a copy of the\r\n    written offer to provide the Corresponding Source.  This\r\n    alternative is allowed only occasionally and noncommercially, and\r\n    only if you received the object code with such an offer, in accord\r\n    with subsection 6b.\r\n\r\n    d) Convey the object code by offering access from a designated\r\n    place (gratis or for a charge), and offer equivalent access to the\r\n    Corresponding Source in the same way through the same place at no\r\n    further charge.  You need not require recipients to copy the\r\n    Corresponding Source along with the object code.  If the place to\r\n    copy the object code is a network server, the Corresponding Source\r\n    may be on a different server (operated by you or a third party)\r\n    that supports equivalent copying facilities, provided you maintain\r\n    clear directions next to the object code saying where to find the\r\n    Corresponding Source.  Regardless of what server hosts the\r\n    Corresponding Source, you remain obligated to ensure that it is\r\n    available for as long as needed to satisfy these requirements.\r\n\r\n    e) Convey the object code using peer-to-peer transmission, provided\r\n    you inform other peers where the object code and Corresponding\r\n    Source of the work are being offered to the general public at no\r\n    charge under subsection 6d.\r\n\r\n  A separable portion of the object code, whose source code is excluded\r\nfrom the Corresponding Source as a System Library, need not be\r\nincluded in conveying the object code work.\r\n\r\n  A \"User Product\" is either (1) a \"consumer product\", which means any\r\ntangible personal property which is normally used for personal, family,\r\nor household purposes, or (2) anything designed or sold for incorporation\r\ninto a dwelling.  In determining whether a product is a consumer product,\r\ndoubtful cases shall be resolved in favor of coverage.  For a particular\r\nproduct received by a particular user, \"normally used\" refers to a\r\ntypical or common use of that class of product, regardless of the status\r\nof the particular user or of the way in which the particular user\r\nactually uses, or expects or is expected to use, the product.  A product\r\nis a consumer product regardless of whether the product has substantial\r\ncommercial, industrial or non-consumer uses, unless such uses represent\r\nthe only significant mode of use of the product.\r\n\r\n  \"Installation Information\" for a User Product means any methods,\r\nprocedures, authorization keys, or other information required to install\r\nand execute modified versions of a covered work in that User Product from\r\na modified version of its Corresponding Source.  The information must\r\nsuffice to ensure that the continued functioning of the modified object\r\ncode is in no case prevented or interfered with solely because\r\nmodification has been made.\r\n\r\n  If you convey an object code work under this section in, or with, or\r\nspecifically for use in, a User Product, and the conveying occurs as\r\npart of a transaction in which the right of possession and use of the\r\nUser Product is transferred to the recipient in perpetuity or for a\r\nfixed term (regardless of how the transaction is characterized), the\r\nCorresponding Source conveyed under this section must be accompanied\r\nby the Installation Information.  But this requirement does not apply\r\nif neither you nor any third party retains the ability to install\r\nmodified object code on the User Product (for example, the work has\r\nbeen installed in ROM).\r\n\r\n  The requirement to provide Installation Information does not include a\r\nrequirement to continue to provide support service, warranty, or updates\r\nfor a work that has been modified or installed by the recipient, or for\r\nthe User Product in which it has been modified or installed.  Access to a\r\nnetwork may be denied when the modification itself materially and\r\nadversely affects the operation of the network or violates the rules and\r\nprotocols for communication across the network.\r\n\r\n  Corresponding Source conveyed, and Installation Information provided,\r\nin accord with this section must be in a format that is publicly\r\ndocumented (and with an implementation available to the public in\r\nsource code form), and must require no special password or key for\r\nunpacking, reading or copying.\r\n\r\n  7. Additional Terms.\r\n\r\n  \"Additional permissions\" are terms that supplement the terms of this\r\nLicense by making exceptions from one or more of its conditions.\r\nAdditional permissions that are applicable to the entire Program shall\r\nbe treated as though they were included in this License, to the extent\r\nthat they are valid under applicable law.  If additional permissions\r\napply only to part of the Program, that part may be used separately\r\nunder those permissions, but the entire Program remains governed by\r\nthis License without regard to the additional permissions.\r\n\r\n  When you convey a copy of a covered work, you may at your option\r\nremove any additional permissions from that copy, or from any part of\r\nit.  (Additional permissions may be written to require their own\r\nremoval in certain cases when you modify the work.)  You may place\r\nadditional permissions on material, added by you to a covered work,\r\nfor which you have or can give appropriate copyright permission.\r\n\r\n  Notwithstanding any other provision of this License, for material you\r\nadd to a covered work, you may (if authorized by the copyright holders of\r\nthat material) supplement the terms of this License with terms:\r\n\r\n    a) Disclaiming warranty or limiting liability differently from the\r\n    terms of sections 15 and 16 of this License; or\r\n\r\n    b) Requiring preservation of specified reasonable legal notices or\r\n    author attributions in that material or in the Appropriate Legal\r\n    Notices displayed by works containing it; or\r\n\r\n    c) Prohibiting misrepresentation of the origin of that material, or\r\n    requiring that modified versions of such material be marked in\r\n    reasonable ways as different from the original version; or\r\n\r\n    d) Limiting the use for publicity purposes of names of licensors or\r\n    authors of the material; or\r\n\r\n    e) Declining to grant rights under trademark law for use of some\r\n    trade names, trademarks, or service marks; or\r\n\r\n    f) Requiring indemnification of licensors and authors of that\r\n    material by anyone who conveys the material (or modified versions of\r\n    it) with contractual assumptions of liability to the recipient, for\r\n    any liability that these contractual assumptions directly impose on\r\n    those licensors and authors.\r\n\r\n  All other non-permissive additional terms are considered \"further\r\nrestrictions\" within the meaning of section 10.  If the Program as you\r\nreceived it, or any part of it, contains a notice stating that it is\r\ngoverned by this License along with a term that is a further\r\nrestriction, you may remove that term.  If a license document contains\r\na further restriction but permits relicensing or conveying under this\r\nLicense, you may add to a covered work material governed by the terms\r\nof that license document, provided that the further restriction does\r\nnot survive such relicensing or conveying.\r\n\r\n  If you add terms to a covered work in accord with this section, you\r\nmust place, in the relevant source files, a statement of the\r\nadditional terms that apply to those files, or a notice indicating\r\nwhere to find the applicable terms.\r\n\r\n  Additional terms, permissive or non-permissive, may be stated in the\r\nform of a separately written license, or stated as exceptions;\r\nthe above requirements apply either way.\r\n\r\n  8. Termination.\r\n\r\n  You may not propagate or modify a covered work except as expressly\r\nprovided under this License.  Any attempt otherwise to propagate or\r\nmodify it is void, and will automatically terminate your rights under\r\nthis License (including any patent licenses granted under the third\r\nparagraph of section 11).\r\n\r\n  However, if you cease all violation of this License, then your\r\nlicense from a particular copyright holder is reinstated (a)\r\nprovisionally, unless and until the copyright holder explicitly and\r\nfinally terminates your license, and (b) permanently, if the copyright\r\nholder fails to notify you of the violation by some reasonable means\r\nprior to 60 days after the cessation.\r\n\r\n  Moreover, your license from a particular copyright holder is\r\nreinstated permanently if the copyright holder notifies you of the\r\nviolation by some reasonable means, this is the first time you have\r\nreceived notice of violation of this License (for any work) from that\r\ncopyright holder, and you cure the violation prior to 30 days after\r\nyour receipt of the notice.\r\n\r\n  Termination of your rights under this section does not terminate the\r\nlicenses of parties who have received copies or rights from you under\r\nthis License.  If your rights have been terminated and not permanently\r\nreinstated, you do not qualify to receive new licenses for the same\r\nmaterial under section 10.\r\n\r\n  9. Acceptance Not Required for Having Copies.\r\n\r\n  You are not required to accept this License in order to receive or\r\nrun a copy of the Program.  Ancillary propagation of a covered work\r\noccurring solely as a consequence of using peer-to-peer transmission\r\nto receive a copy likewise does not require acceptance.  However,\r\nnothing other than this License grants you permission to propagate or\r\nmodify any covered work.  These actions infringe copyright if you do\r\nnot accept this License.  Therefore, by modifying or propagating a\r\ncovered work, you indicate your acceptance of this License to do so.\r\n\r\n  10. Automatic Licensing of Downstream Recipients.\r\n\r\n  Each time you convey a covered work, the recipient automatically\r\nreceives a license from the original licensors, to run, modify and\r\npropagate that work, subject to this License.  You are not responsible\r\nfor enforcing compliance by third parties with this License.\r\n\r\n  An \"entity transaction\" is a transaction transferring control of an\r\norganization, or substantially all assets of one, or subdividing an\r\norganization, or merging organizations.  If propagation of a covered\r\nwork results from an entity transaction, each party to that\r\ntransaction who receives a copy of the work also receives whatever\r\nlicenses to the work the party's predecessor in interest had or could\r\ngive under the previous paragraph, plus a right to possession of the\r\nCorresponding Source of the work from the predecessor in interest, if\r\nthe predecessor has it or can get it with reasonable efforts.\r\n\r\n  You may not impose any further restrictions on the exercise of the\r\nrights granted or affirmed under this License.  For example, you may\r\nnot impose a license fee, royalty, or other charge for exercise of\r\nrights granted under this License, and you may not initiate litigation\r\n(including a cross-claim or counterclaim in a lawsuit) alleging that\r\nany patent claim is infringed by making, using, selling, offering for\r\nsale, or importing the Program or any portion of it.\r\n\r\n  11. Patents.\r\n\r\n  A \"contributor\" is a copyright holder who authorizes use under this\r\nLicense of the Program or a work on which the Program is based.  The\r\nwork thus licensed is called the contributor's \"contributor version\".\r\n\r\n  A contributor's \"essential patent claims\" are all patent claims\r\nowned or controlled by the contributor, whether already acquired or\r\nhereafter acquired, that would be infringed by some manner, permitted\r\nby this License, of making, using, or selling its contributor version,\r\nbut do not include claims that would be infringed only as a\r\nconsequence of further modification of the contributor version.  For\r\npurposes of this definition, \"control\" includes the right to grant\r\npatent sublicenses in a manner consistent with the requirements of\r\nthis License.\r\n\r\n  Each contributor grants you a non-exclusive, worldwide, royalty-free\r\npatent license under the contributor's essential patent claims, to\r\nmake, use, sell, offer for sale, import and otherwise run, modify and\r\npropagate the contents of its contributor version.\r\n\r\n  In the following three paragraphs, a \"patent license\" is any express\r\nagreement or commitment, however denominated, not to enforce a patent\r\n(such as an express permission to practice a patent or covenant not to\r\nsue for patent infringement).  To \"grant\" such a patent license to a\r\nparty means to make such an agreement or commitment not to enforce a\r\npatent against the party.\r\n\r\n  If you convey a covered work, knowingly relying on a patent license,\r\nand the Corresponding Source of the work is not available for anyone\r\nto copy, free of charge and under the terms of this License, through a\r\npublicly available network server or other readily accessible means,\r\nthen you must either (1) cause the Corresponding Source to be so\r\navailable, or (2) arrange to deprive yourself of the benefit of the\r\npatent license for this particular work, or (3) arrange, in a manner\r\nconsistent with the requirements of this License, to extend the patent\r\nlicense to downstream recipients.  \"Knowingly relying\" means you have\r\nactual knowledge that, but for the patent license, your conveying the\r\ncovered work in a country, or your recipient's use of the covered work\r\nin a country, would infringe one or more identifiable patents in that\r\ncountry that you have reason to believe are valid.\r\n\r\n  If, pursuant to or in connection with a single transaction or\r\narrangement, you convey, or propagate by procuring conveyance of, a\r\ncovered work, and grant a patent license to some of the parties\r\nreceiving the covered work authorizing them to use, propagate, modify\r\nor convey a specific copy of the covered work, then the patent license\r\nyou grant is automatically extended to all recipients of the covered\r\nwork and works based on it.\r\n\r\n  A patent license is \"discriminatory\" if it does not include within\r\nthe scope of its coverage, prohibits the exercise of, or is\r\nconditioned on the non-exercise of one or more of the rights that are\r\nspecifically granted under this License.  You may not convey a covered\r\nwork if you are a party to an arrangement with a third party that is\r\nin the business of distributing software, under which you make payment\r\nto the third party based on the extent of your activity of conveying\r\nthe work, and under which the third party grants, to any of the\r\nparties who would receive the covered work from you, a discriminatory\r\npatent license (a) in connection with copies of the covered work\r\nconveyed by you (or copies made from those copies), or (b) primarily\r\nfor and in connection with specific products or compilations that\r\ncontain the covered work, unless you entered into that arrangement,\r\nor that patent license was granted, prior to 28 March 2007.\r\n\r\n  Nothing in this License shall be construed as excluding or limiting\r\nany implied license or other defenses to infringement that may\r\notherwise be available to you under applicable patent law.\r\n\r\n  12. No Surrender of Others' Freedom.\r\n\r\n  If conditions are imposed on you (whether by court order, agreement or\r\notherwise) that contradict the conditions of this License, they do not\r\nexcuse you from the conditions of this License.  If you cannot convey a\r\ncovered work so as to satisfy simultaneously your obligations under this\r\nLicense and any other pertinent obligations, then as a consequence you may\r\nnot convey it at all.  For example, if you agree to terms that obligate you\r\nto collect a royalty for further conveying from those to whom you convey\r\nthe Program, the only way you could satisfy both those terms and this\r\nLicense would be to refrain entirely from conveying the Program.\r\n\r\n  13. Use with the GNU Affero General Public License.\r\n\r\n  Notwithstanding any other provision of this License, you have\r\npermission to link or combine any covered work with a work licensed\r\nunder version 3 of the GNU Affero General Public License into a single\r\ncombined work, and to convey the resulting work.  The terms of this\r\nLicense will continue to apply to the part which is the covered work,\r\nbut the special requirements of the GNU Affero General Public License,\r\nsection 13, concerning interaction through a network will apply to the\r\ncombination as such.\r\n\r\n  14. Revised Versions of this License.\r\n\r\n  The Free Software Foundation may publish revised and/or new versions of\r\nthe GNU General Public License from time to time.  Such new versions will\r\nbe similar in spirit to the present version, but may differ in detail to\r\naddress new problems or concerns.\r\n\r\n  Each version is given a distinguishing version number.  If the\r\nProgram specifies that a certain numbered version of the GNU General\r\nPublic License \"or any later version\" applies to it, you have the\r\noption of following the terms and conditions either of that numbered\r\nversion or of any later version published by the Free Software\r\nFoundation.  If the Program does not specify a version number of the\r\nGNU General Public License, you may choose any version ever published\r\nby the Free Software Foundation.\r\n\r\n  If the Program specifies that a proxy can decide which future\r\nversions of the GNU General Public License can be used, that proxy's\r\npublic statement of acceptance of a version permanently authorizes you\r\nto choose that version for the Program.\r\n\r\n  Later license versions may give you additional or different\r\npermissions.  However, no additional obligations are imposed on any\r\nauthor or copyright holder as a result of your choosing to follow a\r\nlater version.\r\n\r\n  15. Disclaimer of Warranty.\r\n\r\n  THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY\r\nAPPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT\r\nHOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM \"AS IS\" WITHOUT WARRANTY\r\nOF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,\r\nTHE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\r\nPURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM\r\nIS WITH YOU.  SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF\r\nALL NECESSARY SERVICING, REPAIR OR CORRECTION.\r\n\r\n  16. Limitation of Liability.\r\n\r\n  IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING\r\nWILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS\r\nTHE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY\r\nGENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE\r\nUSE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF\r\nDATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD\r\nPARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),\r\nEVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF\r\nSUCH DAMAGES.\r\n\r\n  17. Interpretation of Sections 15 and 16.\r\n\r\n  If the disclaimer of warranty and limitation of liability provided\r\nabove cannot be given local legal effect according to their terms,\r\nreviewing courts shall apply local law that most closely approximates\r\nan absolute waiver of all civil liability in connection with the\r\nProgram, unless a warranty or assumption of liability accompanies a\r\ncopy of the Program in return for a fee.\r\n\r\n                     END OF TERMS AND CONDITIONS\r\n\r\n            How to Apply These Terms to Your New Programs\r\n\r\n  If you develop a new program, and you want it to be of the greatest\r\npossible use to the public, the best way to achieve this is to make it\r\nfree software which everyone can redistribute and change under these terms.\r\n\r\n  To do so, attach the following notices to the program.  It is safest\r\nto attach them to the start of each source file to most effectively\r\nstate the exclusion of warranty; and each file should have at least\r\nthe \"copyright\" line and a pointer to where the full notice is found.\r\n\r\n    <one line to give the program's name and a brief idea of what it does.>\r\n    Copyright (C) <year>  <name of author>\r\n\r\n    This program is free software: you can redistribute it and/or modify\r\n    it under the terms of the GNU General Public License as published by\r\n    the Free Software Foundation, either version 3 of the License, or\r\n    (at your option) any later version.\r\n\r\n    This program is distributed in the hope that it will be useful,\r\n    but WITHOUT ANY WARRANTY; without even the implied warranty of\r\n    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the\r\n    GNU General Public License for more details.\r\n\r\n    You should have received a copy of the GNU General Public License\r\n    along with this program.  If not, see <https://www.gnu.org/licenses/>.\r\n\r\nAlso add information on how to contact you by electronic and paper mail.\r\n\r\n  If the program does terminal interaction, make it output a short\r\nnotice like this when it starts in an interactive mode:\r\n\r\n    <program>  Copyright (C) <year>  <name of author>\r\n    This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.\r\n    This is free software, and you are welcome to redistribute it\r\n    under certain conditions; type `show c' for details.\r\n\r\nThe hypothetical commands `show w' and `show c' should show the appropriate\r\nparts of the General Public License.  Of course, your program's commands\r\nmight be different; for a GUI interface, you would use an \"about box\".\r\n\r\n  You should also get your employer (if you work as a programmer) or school,\r\nif any, to sign a \"copyright disclaimer\" for the program, if necessary.\r\nFor more information on this, and how to apply and follow the GNU GPL, see\r\n<https://www.gnu.org/licenses/>.\r\n\r\n  The GNU General Public License does not permit incorporating your program\r\ninto proprietary programs.  If your program is a subroutine library, you\r\nmay consider it more useful to permit linking proprietary applications with\r\nthe library.  If this is what you want to do, use the GNU Lesser General\r\nPublic License instead of this License.  But first, please read\r\n<https://www.gnu.org/licenses/why-not-lgpl.html>.\r\n"
  },
  {
    "path": "README.md",
    "content": "# Genealogy Database of Fuzzers\n\nThis repository is our attempt to maintain an up-to-date genealogy database of\nfuzzers and relevant papers. It is the continuation of an initial effort made by\nManès et al. in [\"The Art, Science, and Engineering of Fuzzing: A\nSurvey\"](https://ieeexplore.ieee.org/document/8863940), published in 2019 in\n*IEEE Transactions on Software Engineering*. You can visit\nhttps://fuzzing-survey.org to see an interactive site backed by this database.\n\n## What is this survey about?\n\nOur survey is about fuzzers and the relevant literature. Since \"fuzzing\" is a\nlargely overloaded term, a primary goal of our survey is to precisely define\nwhat fuzzing is and to characterize various fuzzers. To this end, we split the\nprocess of fuzzing into several steps and use them to systematically categorize\nfuzzers based on their features. This repository maintains one of the major\noutcomes of this effort, namely a genealogy graph of fuzzers.\n\n## How is this genealogy graph rendered?\n\nWe use a [force-directed graph layout\nalgorithm](https://en.wikipedia.org/wiki/Force-directed_graph_drawing) with\nseveral tweaks. In our current layout, nodes tend to be sorted vertically based\non their year of publication and inter-linked nodes tend to be spatially\nclustered together.\n\n## How can I contribute?\n\nWe have seeded this repository with the data we collected for our 2019 survey.\nDue to the rapid development in fuzzing, we realize our database will quickly\nbecome outdated due to missing papers and tools. It is our hope that, by hosting\nthis repository in public, you can contribute to this database and help keep it\nup-to-date. Please proceed to the [contribution guideline](CONTRIBUTING.md) if\nyou wish to contribute.\n\n## Who are the maintainers of this database?\n\nThis database is currently maintained by:\n- [Cyber Security Research Center (CSRC) at KAIST](https://csrc.kaist.ac.kr/)\n- [SoftSec Lab. at KAIST](https://softsec.kaist.ac.kr/)\n\n## How do I cite this work?\n\nIf you plan to refer to this work, please consider citing our 2019 survey using\nthe following BibTeX entry. Thank you!\n\n(We are hosting a [pre-print of our\nsurvey](https://softsec.kaist.ac.kr/~sangkilc/papers/manes-tse19.pdf) until the\nfinal version is published at IEEE.)\n\n```bibtex\n@ARTICLE{manes:tse:2021,\n  author = {Valentin J. M. Man{\\`{e}}s and HyungSeok Han and Choongwoo Han and Sang Kil Cha and Manuel Egele and Edward J. Schwartz and Maverick Woo},\n  title = {The Art, Science, and Engineering of Fuzzing: A Survey},\n  journal = {IEEE Transactions on Software Engineering},\n  volume = {47},\n  number = {11},\n  pages = {2312--2331},\n  year = 2021\n}\n```\n"
  },
  {
    "path": "css/asefuzz.css",
    "content": "/* */\n\nbody {\n  display: flex;\n  flex-direction: column;\n  min-height: 100vh;\n  height: 100%;\n  overflow: hidden;\n}\n\n.main {\n  flex: 1;\n  display: flex;\n  margin-left: 0;\n  margin-right: 0;\n  min-height: 0;\n}\n\n.searchform {\n  overflow: auto;\n  flex: 1;\n}\n\n.searchform__result {\n  position: absolute;\n  width: 50%;\n  z-index: 1;\n}\n\n.searchform__result > li {\n  overflow: hidden;\n  border: none;\n  cursor: pointer;\n}\n\n.searchform__result > li.active {\n  color: var(--dark);\n  background-color: var(--yellow);\n}\n\n.searchform__result > li:hover {\n  background-color: var(--yellow);\n}\n\n.canvas {\n  flex: 1;\n  min-height: 0;\n  overflow: hidden;\n}\n\n.separator {\n  display: none;\n}\n\n.infobox {\n  position: relative;\n  width: 100%;\n  height: 100%;\n  overflow-x: hidden;\n  transition: 0.5s;\n  padding: 0px;\n  display: none;\n}\n\n.infobox__close {\n  padding-top: 10px;\n  text-align: center;\n}\n\n@media (min-width: 768px) {\n  .separator {\n    display: initial;\n    flex-basis: 4px;\n    background-color: darkgrey;\n    cursor: col-resize;\n  }\n\n  .infobox {\n    display: initial;\n    height: 100%;\n    flex-basis: 400px;\n    overflow-x: hidden;\n    transition: 0.5s;\n    padding: 0px;\n  }\n\n  .infobox__close {\n    display: none;\n  }\n}\n\n.infobox__header {\n  background-color: lightgrey;\n  padding: 5px;\n}\n\n.infobox__icon,\n.infobox__icon:active,\n.infobox__icon:hover,\n.infobox__icon:visited {\n  color: var(--secondary);\n}\n\n.footer {\n  background-color: var(--light);\n}\n\n.node {\n  cursor: pointer;\n}\n\n.node-blackbox {\n  fill: #111111;\n  fill-opacity: 0.9;\n  stroke: var(--dark);\n  stroke-width: 3px;\n}\n\n.node-whitebox {\n  fill: #fefefe;\n  stroke: var(--dark);\n  stroke-width: 1px;\n}\n\n.node-greybox {\n  fill: #999999;\n  stroke: var(--gray);\n  stroke-width: 3px;\n}\n\n.node-found {\n  fill: var(--red) !important;\n}\n\n.node-selected {\n  fill: var(--green) !important;\n  stroke: var(--green) !important;\n}\n\n.nodetext {\n  font: 9px sans-serif;\n  font-weight: bold;\n  text-anchor: middle;\n  cursor: pointer;\n}\n\n.nodetext-blackbox {\n  fill: var(--white);\n}\n\n.link {\n  fill: none;\n  stroke: var(--gray);\n  stroke-width: 2px;\n}\n\n.stats-body__filter {\n  display: block;\n  width: 100%;\n  padding: 7px 10px;\n  border: 2px solid var(--gray);\n  border-radius: 15px;\n  outline: 0;\n}\n\n.modal.fade {\n  overflow: hidden;\n}\n\n.modal-content .modal-body {\n  height: 80vh;\n  overflow-y: scroll;\n}\n\n.accordion .card {\n  border: 0px;\n}\n\n.card .card-header {\n  padding: 5px;\n  border: 0px;\n  cursor: pointer;\n}\n\n.modal-body .accordion {\n  height: 200px;\n  overflow-y: scroll;\n}\n\n.space-top {\n  margin-top: 15px;\n}\n"
  },
  {
    "path": "data/fuzzers.json",
    "content": "[\n  {\n    \"name\": \"ACTOR\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Marius Fleischer\",\n      \"Dipanjan Das\",\n      \"Priyanka Bose\",\n      \"Weiheng Bai\",\n      \"Kangjie Lu\",\n      \"Mathias Payer\",\n      \"Christopher Kruegel\",\n      \"Giovanni Vigna\"\n    ],\n    \"toolurl\": \"https://github.com/ucsb-seclab/actor\",\n    \"title\": \"ACTOR: Action-Guided Kernel Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-fleischer.pdf\"\n    ]\n  },\n  {\n    \"name\": \"AFL\",\n    \"year\": 2014,\n    \"author\": [\n      \"Michał Zalewski\"\n    ],\n    \"toolurl\": \"http://lcamtuf.coredump.cx/afl/\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"miscurl\": [\n      \"http://lcamtuf.coredump.cx/afl/technical_details.txt\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AFL++\",\n    \"year\": 2019,\n    \"author\": [\n      \"Marc Heuse\",\n      \"Heiko Eißfeldt\",\n      \"Andrea Fioraldi\",\n      \"Dominik Maier\"\n    ],\n    \"toolurl\": \"https://github.com/AFLplusplus/AFLplusplus\",\n    \"miscurl\": [\n      \"https://aflplus.plus/\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFLFast\",\n      \"MOPT\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AFL-HIER\",\n    \"year\": 2021,\n    \"author\": [\n      \"Jinghan Wang\",\n      \"Chengyu Song\",\n      \"Heng Yin\"\n    ],\n    \"title\": \"Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/bitsecurerlab/aflplusplus-hier\",\n    \"miscurl\": [\n      \"https://www.cs.ucr.edu/~heng/pubs/afl-hier.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"AFL++\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AFLChurn\",\n    \"year\": 2021,\n    \"author\": [\n      \"Xiaogang Zhu\",\n      \"Marcel Böhme\"\n    ],\n    \"title\": \"Regression Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://github.com/aflchurn/aflchurn\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AFLFast\",\n    \"year\": 2016,\n    \"author\": [\n      \"Marcel Böhme\",\n      \"Van-Thuan Pham\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"title\": \"Coverage-based Greybox Fuzzing as Markov Chain\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://mboehme.github.io/paper/CCS16.pdf\",\n      \"https://mboehme.github.io/paper/TSE18.pdf\"\n    ],\n    \"toolurl\": \"https://github.com/mboehme/aflfast\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AFLGo\",\n    \"year\": 2017,\n    \"author\": [\n      \"Marcel Böhme\",\n      \"Van-Thuan Pham\",\n      \"Manh-Dung Nguyen\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"title\": \"Directed Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://mboehme.github.io/paper/CCS17.pdf\"\n    ],\n    \"toolurl\": \"https://github.com/aflgo/aflgo\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"AFLFast\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AFLNet\",\n    \"year\": 2020,\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Van-Thuan Pham\",\n      \"Marcel Böhme\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"toolurl\": \"https://github.com/aflnet/aflnet\",\n    \"title\": \"AFLNet: A Greybox Fuzzer for Network Protocols\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Testing, Validation and Verification\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/document/9159093\"\n    ]\n  },\n  {\n    \"name\": \"AFLRun\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Huanyao Rong\",\n      \"Wei You\",\n      \"XiaoFeng Wang\",\n      \"Tiaohao Mao\"\n    ],\n    \"toolurl\": \"https://github.com/Mem2019/AFLRun\",\n    \"title\": \"Toward Unbiased Multiple-Target Fuzzing with Path Diversity\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL++\",\n      \"AFLGo\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-rong.pdf\"\n    ]\n  },\n  {\n    \"name\": \"AFLSmart\",\n    \"year\": 2019,\n    \"author\": [\n      \"Van-Thuan Pham\",\n      \"Marcel Böhme\",\n      \"Andrew E. Santosa\",\n      \"Alexandru Razvan Caciulescu\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"title\": \"Smart Greybox Fuzzing\",\n    \"booktitle\": \"IEEE Transactions on Software Engineering\",\n    \"toolurl\": \"https://github.com/aflsmart/aflsmart\",\n    \"miscurl\": [\n      \"https://thuanpv.github.io/publications/TSE19_aflsmart.pdf\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AIFORE\",\n    \"year\": 2023,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Ji Shi\",\n      \"Zhun Wang\",\n      \"Zhiyao Feng\",\n      \"Yang Lan\",\n      \"Shisong Qin\",\n      \"Wei You\",\n      \"Wei Zou\",\n      \"Mathias Payer\",\n      \"Chao Zhang\"\n    ],\n    \"title\": \"AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"VUzzer\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-shi-ji.pdf\"\n    ]\n  },\n  {\n    \"name\": \"AMPFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Johannes Krupp\",\n      \"Ilya Grishchenko\",\n      \"Christian Rossow\"\n    ],\n    \"toolurl\": \"https://github.com/cispa/ampfuzz\",\n    \"title\": \"AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"ParmeSan\",\n      \"Angora\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-krupp.pdf\"\n    ]\n  },\n  {\n    \"name\": \"APE\",\n    \"year\": 2019,\n    \"author\": [\n      \"Tianxiao Gu\",\n      \"Chengnian Sun\",\n      \"Xiaoxing Ma\",\n      \"Chun Cao\",\n      \"Chang Xu\",\n      \"Yuan Yao\",\n      \"Qirun Zhang\",\n      \"Jian Lu\",\n      \"Zhendong Su\"\n    ],\n    \"title\": \"Practical GUI Testing of Android Applications via Model Abstraction and Refinement\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/tianxiaogu/ape\",\n    \"miscurl\": [\n      \"http://gutianxiao.com/static/ape-icse-2019.pdf\"\n    ],\n    \"targets\": [\n      \"UI\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Aafer et al.\",\n    \"year\": 2021,\n    \"author\": [\n      \"Yousra Aafer\",\n      \"Wei You\",\n      \"Yi Sun\",\n      \"Yu Shi\",\n      \"Xiangyu Zhang\",\n      \"Heng Yin\"\n    ],\n    \"title\": \"Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec21fall-aafer.pdf\"\n    ],\n    \"targets\": [\n      \"API\"\n    ],\n    \"references\": [\n      \"FANS\",\n      \"IoTFuzzer\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Angora\",\n    \"year\": 2018,\n    \"author\": [\n      \"Peng Chen\",\n      \"Hao Chen\"\n    ],\n    \"title\": \"Angora: Efficient Fuzzing by Principled Search\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"toolurl\": \"https://github.com/AngoraFuzzer/Angora\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Ankou\",\n    \"year\": 2020,\n    \"author\": [\n      \"Valentin J.M. Manès\",\n      \"Soomin Kim\",\n      \"Sang Kil Cha\"\n    ],\n    \"title\": \"Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://softsec.kaist.ac.kr/~sangkilc/papers/manes-icse20.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"toolurl\": \"https://github.com/SoftSec-KAIST/ankou\",\n    \"references\": [\n      \"AFL\",\n      \"AFLFast\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AssetFuzzer\",\n    \"year\": 2010,\n    \"author\": [\n      \"Zhifeng Lai\",\n      \"S.C. Cheung\",\n      \"W.K. Chan\"\n    ],\n    \"title\": \"Detecting Atomic-Set Serializability Violations in Multithreaded Programs through Active Randomized Testing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"references\": [\n      \"CalFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"AtomFuzzer\",\n    \"year\": 2008,\n    \"author\": [\n      \"Chang-Seo Park\",\n      \"Koushik Sen\"\n    ],\n    \"title\": \"Randomized Active Atomicity Violation Detection in Concurrent Programs\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"toolurl\": \"https://github.com/ksen007/calfuzzer\",\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"references\": [\n      \"CalFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Atropos\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Web\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Emre Güler\",\n      \"Sergej Schumilo\",\n      \"Moritz Schloegel\",\n      \"Nils Bars\",\n      \"Philipp Görz\",\n      \"Xinyi Xu\",\n      \"Cemal Kaygusuz\",\n      \"Thorsten Holz\"\n    ],\n    \"toolurl\": \"https://github.com/cispa-syssec/atropos-legacy\",\n    \"title\": \"Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Witcher\",\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-guler.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Autodafé\",\n    \"year\": 2005,\n    \"author\": [\n      \"Martin Vuagnoux\"\n    ],\n    \"title\": \"Autodafé: an Act of Software Torture\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://infoscience.epfl.ch/record/140525/files/Vuagnoux05.pdf\"\n    ],\n    \"references\": [\n      \"SPIKE\"\n    ],\n    \"targets\": [],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"BEACON\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Heqing Huang\",\n      \"Yiyuan Guo\",\n      \"Qingkai Shi\",\n      \"Peisen Yao\",\n      \"Rongxin Wu\",\n      \"Charles Zhang\"\n    ],\n    \"toolurl\": \"https://hub.docker.com/r/yguoaz/beacon\",\n    \"title\": \"BEACON : Directed Grey-Box Fuzzing with Provable Path Pruning\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"miscurl\": [\n      \"https://qingkaishi.github.io/public_pdfs/SP22.pdf\"\n    ],\n    \"keywords\": [\n      \"Directed fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"BFF\",\n    \"year\": 2010,\n    \"author\": [\n      \"CERT\"\n    ],\n    \"toolurl\": \"https://resources.sei.cmu.edu/library/asset-view.cfm?assetID=507974\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"zzuf\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"BRF\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"author\": [\n      \"Hsin-Wei Hung\",\n      \"Ardalan Amiri Sani\"\n    ],\n    \"toolurl\": \"https://github.com/trusslab/brf\",\n    \"title\": \"{BRF}: Fuzzing the {eBPF} Runtime\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3643778\"\n    ]\n  },\n  {\n    \"name\": \"BUZZBEE\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"DBMS\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Squirrel\"\n    ],\n    \"author\": [\n      \"Yupeng Yang\",\n      \"Yongheng Chen\",\n      \"Rui Zhong\",\n      \"Jizhou Chen\",\n      \"Wenke Lee\"\n    ],\n    \"toolurl\": \"https://github.com/OMH4ck/BuzzBee\",\n    \"title\": \"BUZZBEE: Towards Generic Database Management System Fuzzing\",\n    \"booktitle\": \"Proceedings of the 33rd USENIX Security Symposium\",\n    \"journal\": \"USENIX Security\",\n    \"miscurl\": [\n      \"https://www.usenix.org/conference/usenixsecurity24/presentation/yang-yupeng\"\n    ],\n    \"keywords\": [\n      \"dbms\",\n      \"sql\",\n      \"nosql\"\n    ]\n  },\n  {\n    \"name\": \"BeDivFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Java\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Hoang Lam Nguyen\",\n      \"Lars Grunske\"\n    ],\n    \"toolurl\": \"https://github.com/hub-se/BeDivFuzz\",\n    \"title\": \"BeDivFuzz: Integrating Behavioral Diversity into Generator-based Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"JQF\"\n    ],\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2202.13114.pdf\"\n    ]\n  },\n  {\n    \"name\": \"BigFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Qian Zhang\",\n      \"Jiyuan Wang\",\n      \"Muhammad Ali Gulzar\",\n      \"Rohan Padhye\",\n      \"Miryung Kim\"\n    ],\n    \"title\": \"BigFuzz: Efficient Fuzz Testing for Data Analytics Using Framework Abstraction\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/qianzhanghk/BigFuzz\",\n    \"miscurl\": [\n      \"https://rohan.padhye.org/files/bigfuzz-ase20.pdf\"\n    ],\n    \"targets\": [\n      \"DISC (Data-Intensive Scalable Computing) Systems\"\n    ],\n    \"references\": [\n      \"JQF\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"BitFuzz\",\n    \"year\": 2010,\n    \"author\": [\n      \"Juan Caballero\",\n      \"Pongsin Poosankam\",\n      \"Stephen McCamant\",\n      \"Domagoj Babic\",\n      \"Dawn Song\"\n    ],\n    \"title\": \"Input Generation via Decomposition and Re-stitching: Finding Bugs in Malware\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"http://bitblaze.cs.berkeley.edu/papers/restitching.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Bleem\",\n    \"year\": 2023,\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Zhengxiong Luo\",\n      \"Junze Yu\",\n      \"Feilong Zuo\",\n      \"Jianzhong Liu\",\n      \"Yu Jiang\",\n      \"Ting Chen\",\n      \"Abhik Roychoudhury\",\n      \"Jiaguang Sun\"\n    ],\n    \"title\": \"Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Peach\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-luo-zhengxiong.pdf\"\n    ]\n  },\n  {\n    \"name\": \"BlendFuzz\",\n    \"year\": 2012,\n    \"author\": [\n      \"Dingning Yang\",\n      \"Yuqing Zhang\",\n      \"Qixu Liu\"\n    ],\n    \"title\": \"BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/abstract/document/6296093\"\n    ],\n    \"references\": [\n      \"LangFuzz\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Bonsai-Fuzzing\",\n    \"year\": 2021,\n    \"author\": [\n      \"Vasudev Vikram\",\n      \"Rohan Padhye\",\n      \"Koushik Sen\"\n    ],\n    \"title\": \"Growing A Test Corpus with Bonsai Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"toolurl\": \"https://github.com/vasumv/bonsai-fuzzing\",\n    \"miscurl\": [\n      \"https://thuanpv.github.io/publications/TSE19_aflsmart.pdf\"\n    ],\n    \"references\": [\n      \"Nautilus\",\n      \"Superion\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"BrakTooth\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Matheus E. Garbelini\",\n      \"Vaibhav Bedi\",\n      \"Sudipta Chattopadhyay\",\n      \"Suemi Sun\",\n      \"Ernest Kurniawan\"\n    ],\n    \"toolurl\": \"https://github.com/Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks\",\n    \"title\": \"BrakTooth: Causing Havoc on Bluetooth Link Manater via Directed Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Frankenstein\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-garbelini.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Brennan et al.\",\n    \"year\": 2020,\n    \"author\": [\n      \"Tegan Brennan\",\n      \"Seemanta Saha\",\n      \"Tevfik Bultan\"\n    ],\n    \"title\": \"JVM Fuzzing for JIT-Induced Side-Channel Detection\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"Side-channel\"\n    ],\n    \"references\": [\n      \"Kelinci\",\n      \"DifFuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"BuzzFuzz\",\n    \"year\": 2009,\n    \"author\": [\n      \"Vijay Ganesh\",\n      \"Tim Leek\",\n      \"Martin Rinard\"\n    ],\n    \"title\": \"Taint-based Directed Whitebox Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"SAGE\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"CAB-Fuzz\",\n    \"year\": 2017,\n    \"author\": [\n      \"Su Yong Kim\",\n      \"Sangho Lee\",\n      \"Insu Yun\",\n      \"Wen Xu\",\n      \"Byoungyoung Lee\",\n      \"Youngtae Yun\",\n      \"Taesoo Kim\"\n    ],\n    \"title\": \"CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems\",\n    \"booktitle\": \"Proceedings of the USENIX Annual Technical Conference\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/conference/atc17/atc17-kim.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"Trinity\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"CAFL\",\n    \"year\": 2021,\n    \"author\": [\n      \"Gwangmu Lee\",\n      \"Woochel Shim\",\n      \"Byoungyoung Lee\"\n    ],\n    \"title\": \"Constraint-guided Directed Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec21fall-lee-gwangmu.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"CDFUZZ\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Mingyuan Wu\",\n      \"Jiahong Xiang\",\n      \"Kunqiu Chen\",\n      \"Peng Di\",\n      \"Shin Hwei Tan\",\n      \"Heming Cui\",\n      \"Yuqun Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/GhabiX/CDFuzz\",\n    \"title\": \"Tumbling Down the Rabbit Hole: How do Assisting Exploration Strategies Facilitate Grey-box Fuzzing? \",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://doi.org/10.48550/arXiv.2409.14541\"\n    ],\n    \"keywords\": [\n      \"dictionary strategy\",\n      \"exploration strategies \"\n    ]\n  },\n  {\n    \"name\": \"CHIPSEC\",\n    \"year\": 2015,\n    \"author\": [\n      \"Mikhail Gorobets\",\n      \"Oleksandr Bazhaniuk\",\n      \"Alex Matrosov\",\n      \"Andrew Furtak\",\n      \"Yuriy Bulygin\"\n    ],\n    \"title\": \"Attacking Hypervisors via Firmware and Hardware\",\n    \"booktitle\": \"Proceedings of the Black Hat USA\",\n    \"toolurl\": \"https://github.com/chipsec/chipsec\",\n    \"references\": [\n      \"Sulley\"\n    ],\n    \"targets\": [\n      \"Firmware\",\n      \"Hypervisor\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"CLSmith\",\n    \"year\": 2015,\n    \"author\": [\n      \"Christopher Lidbury\",\n      \"Andrei Lascu\",\n      \"Nathan Chong\",\n      \"Alastair F. Donaldson\"\n    ],\n    \"title\": \"Many-Core Compiler Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"toolurl\": \"http://multicore.doc.ic.ac.uk/projects/clsmith/\",\n    \"miscurl\": [\n      \"http://multicore.doc.ic.ac.uk/tools/CLsmith/paper.pdf\"\n    ],\n    \"references\": [\n      \"CSmith\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"COMFORT\",\n    \"year\": 2021,\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Guixin Ye\",\n      \"Zhanyong Tang\",\n      \"Shin Hwei Tan\",\n      \"Songfang Huang\",\n      \"Dingyi Fang\",\n      \"Xiaoyang Sun\",\n      \"Lizhong Bian\",\n      \"Haibo Wang\",\n      \"Zheng Wang\"\n    ],\n    \"toolurl\": \"https://github.com/NWU-NISL-Fuzzing/COMFORT\",\n    \"title\": \"Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2104.07460.pdf\"\n    ],\n    \"references\": [\n      \"Montage\"\n    ],\n    \"keywords\": [\n      \"JavaScript\"\n    ]\n  },\n  {\n    \"name\": \"CONFETTI\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Java\"\n    ],\n    \"color\": \"whitebox\",\n    \"author\": [\n      \"James Kukucka\",\n      \"Luís Pina\",\n      \"Paul Ammann\",\n      \"Jonathan Bell\"\n    ],\n    \"toolurl\": \"https://github.com/neu-se/CONFETTI\",\n    \"title\": \"CONFETTI: Amplifying Concolic Guidance for Fuzzers\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"JQF\"\n    ],\n    \"miscurl\": [\n      \"https://www.jonbell.net/preprint/confetti.pdf\"\n    ]\n  },\n  {\n    \"name\": \"CONZZER\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Zu-Ming Jiang\",\n      \"Jia-Ju Bai\",\n      \"Kangjie Lu\",\n      \"Shi-Min Hu\"\n    ],\n    \"toolurl\": \"https://oslab.cs.tsinghua.edu.cn/CONZZER/\",\n    \"title\": \"Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www-users.cse.umn.edu/~kjlu/papers/conzzer.pdf\"\n    ],\n    \"references\": [\n      \"Krace\"\n    ]\n  },\n  {\n    \"name\": \"COOPER\",\n    \"year\": 2022,\n    \"author\": [\n      \"Peng Xu\",\n      \"Yanhao Wang\",\n      \"Hong Hu\",\n      \"Purui Su\"\n    ],\n    \"title\": \"COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://huhong789.github.io/papers/xu:cooper.pdf\"\n    ],\n    \"toolurl\": \"https://github.com/TCA-ISCAS/Cooper\",\n    \"targets\": [\n      \"JavaScript\",\n      \"VBA\"\n    ],\n    \"references\": [\n      \"Favocado\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"CSmith\",\n    \"year\": 2011,\n    \"author\": [\n      \"Xuejun Yang\",\n      \"Yang Chen\",\n      \"Eric Eide\",\n      \"John Regehr\"\n    ],\n    \"title\": \"Finding and Understanding Bugs in C Compilers\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"toolurl\": \"https://github.com/csmith-project/csmith/\",\n    \"miscurl\": [\n      \"http://www.cs.utah.edu/~regehr/papers/pldi11-preprint.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"CalFuzzer\",\n    \"year\": 2007,\n    \"author\": [\n      \"Koushik Sen\"\n    ],\n    \"title\": \"Effective Random Testing of Concurrent Programs\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/ksen007/calfuzzer\",\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"CarpetFuzz\",\n    \"year\": 2023,\n    \"targets\": [\n      \"Argument\",\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Dawei Wang\",\n      \"Ying Li\",\n      \"Zhiyu Zhang\",\n      \"Kai Chen\"\n    ],\n    \"toolurl\": \"https://github.com/waugustus/CarpetFuzz\",\n    \"title\": \"CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-wang-dawei.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Cascade\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Flavien Solt\",\n      \"Katharina Ceesay-Seitz\",\n      \"Kaveh Razavi\"\n    ],\n    \"toolurl\": \"https://comsec.ethz.ch/cascade\",\n    \"title\": \"Cascade: CPU Fuzzing via Intricate Program Generation\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"DifuzzRTL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-solt.pdf\"\n    ],\n    \"keywords\": [\n      \"cpu fuzzing\",\n      \"riscv\"\n    ]\n  },\n  {\n    \"name\": \"Cerebro\",\n    \"year\": 2019,\n    \"author\": [\n      \"Yuekang Li\",\n      \"Yinxing Xue\",\n      \"Hongxu Chen\",\n      \"Xuheng Wu\",\n      \"Cen Zhang\",\n      \"Xiaofei Xie\",\n      \"Haijun Wang\",\n      \"Yang Liu\"\n    ],\n    \"title\": \"Cerebro: Context-Aware Adaptive Fuzzing for Effective Vulnerability Detection\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://hongxuchen.github.io/pdf/cerebro.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFLFast\",\n      \"CollAFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ChatAFL\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Ruijie Meng\",\n      \"Martin Mirchev\",\n      \"Marcel Bohme\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"toolurl\": \"https://github.com/ChatAFLndss/ChatAFL\",\n    \"title\": \"Large Language Model guided Protocol Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2024-556-paper.pdf\"\n    ],\n    \"keywords\": [\n      \"LLM\"\n    ]\n  },\n  {\n    \"name\": \"Chen et al\",\n    \"year\": 2019,\n    \"author\": [\n      \"Yuqi Chen\",\n      \"Christopher M. Poskitt\",\n      \"Jun Sun\",\n      \"Sridhar Adepu\",\n      \"Fan Zhang\"\n    ],\n    \"title\": \"Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"https://cposkitt.github.io/files/publications/Chen-Poskitt-et_al.ASE.2019.pdf\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Chopper\",\n    \"year\": 2016,\n    \"author\": [\n      \"David Trabish\",\n      \"Andrea Mattavelli\",\n      \"Noam Rinetzky\",\n      \"Cristian Cadar\"\n    ],\n    \"title\": \"Chopped Symbolic Execution\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"toolurl\": \"https://github.com/jordr/chopper\",\n    \"miscurl\": [\n      \"https://www.cs.tau.ac.il/~maon/pubs/2018-icse.pdf\"\n    ],\n    \"targets\": [\n      \"Argument\",\n      \"File\"\n    ],\n    \"references\": [\n      \"KLEE\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Choronzon\",\n    \"year\": 2015,\n    \"author\": [\n      \"Zisis Sialveras\",\n      \"Nikolaos Naziridis\"\n    ],\n    \"title\": \"Introducing Choronzon: An approach at knowledge-based evolutionary fuzzing\",\n    \"booktitle\": \"Proceedings of the ZeroNights\",\n    \"references\": [\n      \"Sidewinder\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"miscurl\": [\n      \"https://census-labs.com/media/choronzon-zeronights-2015.pdf\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Chronos\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Distributed System\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"FIFUZZ\"\n    ],\n    \"author\": [\n      \"Yuanliang Chen\"\n    ],\n    \"toolurl\": \"https://github.com/SecTechTool/Chronos\",\n    \"title\": \"Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2024/313000a109/1Ub23heRtUA\"\n    ],\n    \"keywords\": [\n      \"distributed system fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"ClozeMaster\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Compiler\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"RustSmith\"\n    ],\n    \"author\": [\n      \"Hongyan Gao\",\n      \"Yibiao Yang\",\n      \"Maolin Sun\",\n      \"Jiangchang Wu\",\n      \"Yuming Zhou\",\n      \"Baowen Xu\"\n    ],\n    \"toolurl\": \"https://github.com/clozeMasterPro/clozeMaster\",\n    \"title\": \"Clozemaster: Fuzzing Rust Compiler by Harnessing Llms for Infilling Masked Real Programs\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/document/11029729\"\n    ],\n    \"keywords\": [\n      \"LLM\"\n    ]\n  },\n  {\n    \"name\": \"CoFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\",\n    \"author\": [\n      \"Ling Jiang\",\n      \"Hengchen Yuan\",\n      \"Mingyuan Wu\",\n      \"Lingming Zhang\",\n      \"Yuqun Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/Tricker-z/CoFuzz\",\n    \"title\": \"Evaluating and Imporving Hybrid Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"AFL\",\n      \"QSYM\"\n    ],\n    \"miscurl\": [\n      \"https://lingming.cs.illinois.edu/publications/icse2023f.pdf\"\n    ],\n    \"keywords\": [\n      \"Hybrid fuzzing\",\n      \"concolic execution\"\n    ]\n  },\n  {\n    \"name\": \"CodeAlchemist\",\n    \"year\": 2019,\n    \"author\": [\n      \"HyungSeok Han\",\n      \"DongHyeon Oh\",\n      \"Sang Kil Cha\"\n    ],\n    \"title\": \"CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/SoftSec-KAIST/CodeAlchemist\",\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"references\": [\n      \"LangFuzz\",\n      \"IFuzzer\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"CollAFL\",\n    \"year\": 2018,\n    \"author\": [\n      \"Shuitao Gan\",\n      \"Chao Zhang\",\n      \"Xiaojun Qin\",\n      \"Xuwen Tu\",\n      \"Kang Li\",\n      \"Zhongyu Pei\",\n      \"Zuoning Chen\"\n    ],\n    \"title\": \"CollAFL: Path Sensitive Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ComFuzz\",\n    \"year\": 2023,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Guixin Ye\",\n      \"Tianmin Hu\",\n      \"Zhanyong Tang\",\n      \"Zhenye Fan\",\n      \"Shin Hwei Tan\",\n      \"Bo Zhang\",\n      \"Wenxiang Qian\",\n      \"Zheng Wang\"\n    ],\n    \"toolurl\": \"https://github.com/NWU-NISL-Fuzzing/COMFUZZ\",\n    \"title\": \"A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"references\": [\n      \"COMFORT\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3611643.3616332\"\n    ]\n  },\n  {\n    \"name\": \"ConfigFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Program configuration\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Zenong Zhang\",\n      \"George Klees\",\n      \"Eric Wang\",\n      \"Michael Hicks\",\n      \"Shiyi Wei\"\n    ],\n    \"title\": \"Fuzzing Configurations of Program Options\",\n    \"booktitle\": \"ACM Transactions on Software Engineering and Methodology\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/10.1145/3580597\"\n    ]\n  },\n  {\n    \"name\": \"ContractFuzzer\",\n    \"year\": 2018,\n    \"author\": [\n      \"Bo Jiang\",\n      \"Ye Liu\",\n      \"Wing-Kwong Chan\"\n    ],\n    \"title\": \"ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/gongbell/ContractFuzzer\",\n    \"targets\": [\n      \"EVM\"\n    ],\n    \"references\": [\n      \"Echidna\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"CorbFuzz\",\n    \"year\": 2021,\n    \"author\": [\n      \"Chaofan Shou\",\n      \"Ismet Burak Kadron\",\n      \"Qi Su\",\n      \"Tevfik Bultan\"\n    ],\n    \"title\": \"CorbFuzz: Checking Browser Security Policies with Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2109.00398.pdf\"\n    ],\n    \"toolurl\": \"https://github.com/shouc/corbfuzz\",\n    \"targets\": [\n      \"Web\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"CountDown\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Shuangpeng Bai\",\n      \"Zhechang Zhang\",\n      \"Hong Hu\"\n    ],\n    \"toolurl\": \"https://github.com/psu-security-universe/countdown\",\n    \"title\": \"CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3658644.3690320\"\n    ],\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"keywords\": [\n      \"kernel\"\n    ]\n  },\n  {\n    \"name\": \"Creal\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"CSmith\"\n    ],\n    \"author\": [\n      \"Shaohua Li\",\n      \"Theodoros Theodoridis\",\n      \"Zhendong Su\"\n    ],\n    \"toolurl\": \"https://github.com/UniCodeSphere/Creal\",\n    \"title\": \"Boosting Compiler Testing by Injecting Real-World Code\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/abs/10.1145/3656386\"\n    ],\n    \"keywords\": [\n      \"compiler fuzzing\",\n      \"real-world code\"\n    ]\n  },\n  {\n    \"name\": \"CrossFire\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"XPU\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Jiaxun Zhu\",\n      \"Minghao Lin\",\n      \"Tingting Yin\",\n      \"Zechao Cai\",\n      \"Yu Wang\",\n      \"Rui Chang\",\n      \"Wenbo Shen\"\n    ],\n    \"toolurl\": \"https://github.com/ZJU-SEC/CrossFire\",\n    \"title\": \"CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3658644.3690376\"\n    ],\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"keywords\": [\n      \"macOS\",\n      \"Apple\",\n      \"XPU\"\n    ]\n  },\n  {\n    \"name\": \"DAFL\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"author\": [\n      \"Tae Eun Kim\",\n      \"Jaeseung Choi\",\n      \"Kihong Heo\",\n      \"Sang Kil Cha\"\n    ],\n    \"toolurl\": \"https://github.com/prosyslab/DAFL-artifact\",\n    \"title\": \"DAFL: Directed Grey-box Fuzzing Guided by Data Dependency\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-kim-tae-eun.pdf\"\n    ]\n  },\n  {\n    \"name\": \"DDRace\",\n    \"year\": 2023,\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Ming Yuan\",\n      \"Bodong Zhao\",\n      \"Penghui Li\",\n      \"Jiashuo Liang\",\n      \"Xinhui Han\",\n      \"Xiapu Luo\",\n      \"Chao Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/vul337/DDRace\",\n    \"title\": \"DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"syzkaller\",\n      \"Krace\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-yuan-ming.pdf\"\n    ]\n  },\n  {\n    \"name\": \"DELTA\",\n    \"year\": 2017,\n    \"author\": [\n      \"Seungsoo Lee\",\n      \"Changhoon Yoon\",\n      \"Chanhee Lee\",\n      \"Seungwon Shin\",\n      \"Vinod Yegneswaran\",\n      \"Phillip Porras\"\n    ],\n    \"title\": \"DELTA: A security assessment framework for software-defined networks\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/seungsoo-lee/DELTA\",\n    \"miscurl\": [\n      \"http://seungsoo.net/papers/delta.pdf\"\n    ],\n    \"references\": [\n      \"BFF\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"DFUZZ\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"whitebox\",\n    \"references\": [\n      \"FuzzGPT\"\n    ],\n    \"author\": [\n      \"Kunpeng Zhang\",\n      \"Shuai Wang\",\n      \"Jitao Han\",\n      \"Xiaogang Zhu\",\n      \"Xian Li\",\n      \"Shaohua Wang\",\n      \"Sheng Wen\"\n    ],\n    \"toolurl\": \"https://github.com/DFUZZ-ICSE/DFUZZ\",\n    \"title\": \"Your Fix Is My Exploit: Enabling Comprehensive DL Library API Fuzzing with Large Language Models \",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://doi.org/10.48550/arXiv.2501.04312\"\n    ],\n    \"keywords\": [\n      \"deep learning libraries fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"DIANE\",\n    \"year\": 2021,\n    \"author\": [\n      \"Nilo Redini\",\n      \"Andrea Continella\",\n      \"Dipanjan Das\",\n      \"Giulio De Pasquale\",\n      \"Noah Spahn\",\n      \"Aravind Machiry\",\n      \"Antonio Bianchi\",\n      \"Christopher Kruegel\",\n      \"Giovanni Vigna\"\n    ],\n    \"title\": \"DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"toolurl\": \"https://github.com/ucsb-seclab/diane\",\n    \"miscurl\": [\n      \"https://conand.me/publications/redini-diane-2021.pdf\"\n    ],\n    \"references\": [\n      \"IoTFuzzer\"\n    ],\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"DIFUZE\",\n    \"year\": 2017,\n    \"author\": [\n      \"Jake Corina\",\n      \"Aravind Machiry\",\n      \"Christopher Salls\",\n      \"Yan Shoshitaishvili\",\n      \"Shuang Hao\",\n      \"Christopher Kruegel\",\n      \"Giovanni Vigna\"\n    ],\n    \"title\": \"DIFUZE: Interface Aware Fuzzing for Kernel Drivers\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://github.com/ucsb-seclab/difuze\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"DOMFuzz\",\n    \"year\": 2008,\n    \"author\": [\n      \"Jesse Ruderman\"\n    ],\n    \"toolurl\": \"https://github.com/MozillaSecurity/funfuzz\",\n    \"targets\": [\n      \"DOM\"\n    ],\n    \"references\": [\n      \"jsfunfuzz\"\n    ],\n    \"color\": \"blackbox\",\n    \"keywords\": [\n      \"JavaScript\"\n    ]\n  },\n  {\n    \"name\": \"DR.FUZZ\",\n    \"year\": 2022,\n    \"author\": [\n      \"Wenjia Zhao\",\n      \"Kangjie Lu\",\n      \"Qiushi Wu\",\n      \"Yong Qi\"\n    ],\n    \"title\": \"Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/secsysresearch/DRFuzz\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2022-345-paper.pdf\"\n    ],\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"DSFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"ParmeSan\"\n    ],\n    \"author\": [\n      \"Yinxi Liu\",\n      \"Wei Meng\"\n    ],\n    \"title\": \"DSFuzz: Detecting Deep State Bugs with Dependent State Exploration\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3576915.3616594\"\n    ]\n  },\n  {\n    \"name\": \"DUMPLING\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Fuzzilli\",\n      \"Jit-Picker\"\n    ],\n    \"author\": [\n      \"Liam Wachter\",\n      \"Julian Gremminger\",\n      \"Christian Wressnegger\",\n      \"Mathias Payer\",\n      \"Flavio Toffalini\"\n    ],\n    \"toolurl\": \"https://github.com/two-heart/dumpling-artifact-evaluation\",\n    \"title\": \"DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing\",\n    \"booktitle\": \"Network and Distributed System Security Symposium (NDSS) 2025\",\n    \"journal\": \"NDSS\",\n    \"miscurl\": [\n      \"https://dx.doi.org/10.14722/ndss.2025.241411\"\n    ],\n    \"keywords\": [\n      \"javascript\",\n      \"jit\",\n      \"differential fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"DarthShader\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"WGSL\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"CSmith\"\n    ],\n    \"author\": [\n      \"Lukas Bernhard\",\n      \"Nico Schiller\",\n      \"Moritz Schloegel\",\n      \"Nils Bars\",\n      \"Thorsten Holz\"\n    ],\n    \"toolurl\": \"https://github.com/wgslfuzz/darthshader\",\n    \"title\": \"DarthShader: Fuzzing WebGPU Shader Translators & Compilers\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://web3.arxiv.org/pdf/2409.01824\"\n    ],\n    \"keywords\": [\n      \"WGSL\",\n      \"shader\"\n    ]\n  },\n  {\n    \"name\": \"DeadlockFuzzer\",\n    \"year\": 2009,\n    \"author\": [\n      \"Pallavi Joshi\",\n      \"Chang-Seo Park\",\n      \"Koushik Sen\",\n      \"Mayur Naik\"\n    ],\n    \"title\": \"A Randomized Dynamic Program Analysis Technique for Detecting Real Deadlocks\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"toolurl\": \"https://github.com/ksen007/calfuzzer\",\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"references\": [\n      \"CalFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"DeepGo\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"author\": [\n      \"Peihong Lin\",\n      \"Pengfei Wang\",\n      \"Xu Zhou\",\n      \"Wei Xie\",\n      \"Gen Zhang\",\n      \"Kai Lu\"\n    ],\n    \"toolurl\": \"https://gitee.com/paynelin/DeepGo\",\n    \"title\": \"DeepGo: Predictive Directed Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2024-514-paper.pdf\"\n    ],\n    \"keywords\": [\n      \"Directed fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"DeepREL\",\n    \"year\": \"2022\",\n    \"targets\": [\n      \"Lib\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Yinlin Deng\",\n      \"Chenyuan Yang\",\n      \"Anjiang Wei\",\n      \"Lingming Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/ise-uiuc/DeepREL\",\n    \"title\": \"Fuzzing Deep-Learning Libraries via Automated Relational API Inference\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"references\": [\n      \"FreeFuzz\"\n    ]\n  },\n  {\n    \"name\": \"DepFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"DISC (Data-Intensive Scalable Computing) Systems\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"BigFuzz\"\n    ],\n    \"author\": [\n      \"Ahmad Humayun\",\n      \"Miryung Kim\",\n      \"Muhammad Ali Gulzar\"\n    ],\n    \"toolurl\": \"https://github.com/SEED-VT/DepFuzz\",\n    \"title\": \"Co-dependence Aware Fuzzing for Dataflow-Based Big Data Analytics\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://people.cs.vt.edu/~gulzar/assets/pdf/depfuzz.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Dewey et al.\",\n    \"year\": 2014,\n    \"author\": [\n      \"Kyle Dewey\",\n      \"Jared Roesch\",\n      \"Ben Hardekopf\"\n    ],\n    \"title\": \"Language Fuzzing Using Constraint Logic Programming\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"https://sites.cs.ucsb.edu/~benh/research/papers/dewey14language.pdf\",\n      \"https://ieeexplore.ieee.org/abstract/document/7372036\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"LangFuzz\",\n      \"CSmith\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Dharma\",\n    \"year\": 2015,\n    \"author\": [\n      \"Christoph Diehl\"\n    ],\n    \"toolurl\": \"https://github.com/MozillaSecurity/dharma\",\n    \"targets\": [\n      \"File\",\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Die\",\n    \"year\": 2020,\n    \"author\": [\n      \"Soyeon Park\",\n      \"Wen Xu\",\n      \"Insu Yun\",\n      \"Daehee Jang\",\n      \"Taesoo Kim\"\n    ],\n    \"title\": \"Fuzzing JavaScript Engines with Aspect-preserving Mutation\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"references\": [\n      \"CodeAlchemist\",\n      \"Superion\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"DifFuzz\",\n    \"year\": 2019,\n    \"author\": [\n      \"Shirin Nilizadeh\",\n      \"Yannic Noller\",\n      \"Corina S. Păsăreanu\"\n    ],\n    \"title\": \"DIFFUZZ: Differential Fuzzing for Side-Channel Analysis\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/isstac/diffuzz\",\n    \"miscurl\": [\n      \"https://yannicnoller.github.io/publications/icse2019_nilizadeh_diffuzz.pdf\"\n    ],\n    \"targets\": [\n      \"Side-channel\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"DifuzzRTL\",\n    \"year\": 2021,\n    \"author\": [\n      \"Jaewon Hur\",\n      \"Suhwan Song\",\n      \"Dongup Kwon\",\n      \"Eunjin Baek\",\n      \"Jangwoo Kim\",\n      \"Byoungyoung Lee\"\n    ],\n    \"title\": \"DIFUZZRTL: Differential Fuzz Testing to Find CPU Bugs\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://lifeasageek.github.io/papers/jaewon-difuzzrtl.pdf\"\n    ],\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"toolurl\": \"https://github.com/compsec-snu/difuzz-rtl\",\n    \"references\": [\n      \"classming\"\n    ],\n    \"color\": \"greybox\",\n    \"keywords\": [\n      \"Register-coverage\"\n    ]\n  },\n  {\n    \"name\": \"DigFuzz\",\n    \"year\": 2019,\n    \"author\": [\n      \"Lei Zhao\",\n      \"Yue Duan\",\n      \"Heng Yin\",\n      \"Jifeng Xuan\"\n    ],\n    \"title\": \"Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.cs.ucr.edu/~heng/pubs/digfuzz_ndss19.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"Driller\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Digtool\",\n    \"year\": 2017,\n    \"author\": [\n      \"Jianfeng Pan\",\n      \"Guanglu Yan\",\n      \"Xiaocao Fan\"\n    ],\n    \"title\": \"Digtool: A virtualization-based framework for detecting kernel vulnerabilities\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-pan.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"DistFuzz\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"Mallory\"\n    ],\n    \"author\": [\n      \"Yonghao Zou\",\n      \"Jia-Ju Bai\",\n      \"Zu-Ming Jiang\",\n      \"Ming Zhao\",\n      \"Diyu Zhou\"\n    ],\n    \"toolurl\": \"https://github.com/zouyonghao/DistFuzz\",\n    \"title\": \"DistFuzz: Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning\",\n    \"booktitle\": \"Network and Distributed System Security Symposium (NDSS) 2025\",\n    \"journal\": \"NDSS\",\n    \"miscurl\": [\n      \"https://dx.doi.org/10.14722/ndss.2025.241912\"\n    ],\n    \"keywords\": [\n      \"distributed systems\"\n    ]\n  },\n  {\n    \"name\": \"Domato\",\n    \"year\": \"2017\",\n    \"targets\": [\n      \"DOM\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Ivan Fratric\"\n    ],\n    \"toolurl\": \"https://github.com/googleprojectzero/domato\",\n    \"references\": [\n      \"DOMFuzz\"\n    ],\n    \"keywords\": [\n      \"JavaScript\"\n    ]\n  },\n  {\n    \"name\": \"Doupé et al.\",\n    \"year\": 2012,\n    \"author\": [\n      \"Adam Doupé\",\n      \"Ludovico Cavedon\",\n      \"Christopher Kruegel\",\n      \"Giovanni Vigna\"\n    ],\n    \"title\": \"Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final225.pdf\"\n    ],\n    \"targets\": [\n      \"Web\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Dowser\",\n    \"year\": 2013,\n    \"author\": [\n      \"Istvan Haller\",\n      \"Asia Slowinska\",\n      \"Matthias Neugschwandtner\",\n      \"Herbert Bos\"\n    ],\n    \"title\": \"Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_haller.pdf\"\n    ],\n    \"references\": [\n      \"FuzzBALL\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Drifuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"whitebox\",\n    \"author\": [\n      \"Zekun Shen\",\n      \"Ritik Roongta\",\n      \"Brendan Dolan-Gavitt\"\n    ],\n    \"toolurl\": \"https://github.com/messlabnyu/DrifuzzProject\",\n    \"title\": \"Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"kAFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-shen-zekun.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Driller\",\n    \"year\": 2016,\n    \"author\": [\n      \"Nick Stephens\",\n      \"John Grosen\",\n      \"Christopher Salls\",\n      \"Andrew Dutcher\",\n      \"Ruoyu Wang\",\n      \"Jacopo Corbetta\",\n      \"Yan Shoshitaishvili\",\n      \"Christopher Kruegel\",\n      \"Giovanni Vigna\"\n    ],\n    \"title\": \"Driller: Augmenting Fuzzing Through Selective Symbolic Execution\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/shellphish/driller\",\n    \"miscurl\": [\n      \"https://sites.cs.ucsb.edu/~chris/research/doc/ndss16_driller.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"Dowser\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"DynSQL\",\n    \"year\": 2023,\n    \"targets\": [\n      \"DBMS\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Zu-Ming Jiang\",\n      \"Jia-Ju Bai\",\n      \"Zhendong Su\"\n    ],\n    \"title\": \"DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Squirrel\",\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-jiang-zu-ming.pdf\"\n    ]\n  },\n  {\n    \"name\": \"EASIER\",\n    \"year\": 2020,\n    \"author\": [\n      \"Ivan Pustogarov\",\n      \"Qian Wu\",\n      \"David Lie\"\n    ],\n    \"title\": \"Ex-vivo dynamic analysis framework for Android device drivers\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://security.csl.toronto.edu/wp-content/uploads/2020/05/pustogarov-oakland2020-easier.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"syzkaller\",\n      \"kAFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ECFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Program configuration\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"ConfigFuzz\"\n    ],\n    \"author\": [\n      \"Junqiang Li\",\n      \"Senyi Li\",\n      \"Keyao Li\",\n      \"Falin Luo\",\n      \"Hongfang Yu\",\n      \"Shanshan Li\",\n      \"Xiang Li\"\n    ],\n    \"toolurl\": \"https://github.com/ecfuzz/ECFuzz\",\n    \"title\": \"ECFuzz: Effective Configuration Fuzzing for Large-Scale Systems\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3597503.3623315\"\n    ]\n  },\n  {\n    \"name\": \"EDEFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"RESTler\"\n    ],\n    \"author\": [\n      \"Lianglu Pan\",\n      \"Shaanan Cohney\",\n      \"Toby Murray\",\n      \"Van-Thuan Pham\"\n    ],\n    \"toolurl\": \"https://github.com/Broken-Assumptions/EDEFuzz\",\n    \"title\": \"EDEFuzz: A Web API Fuzzer for Excessive Data Exposures\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/10.1145/3597503.3608133\"\n    ]\n  },\n  {\n    \"name\": \"EFS\",\n    \"year\": 2007,\n    \"author\": [\n      \"Jared DeMott\",\n      \"Richard Enbody\",\n      \"William F. Punch\"\n    ],\n    \"title\": \"Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing\",\n    \"booktitle\": \"Proceedings of DefCon\",\n    \"targets\": [\n      \"File\",\n      \"Network\"\n    ],\n    \"references\": [\n      \"Sidewinder\",\n      \"GPF\"\n    ],\n    \"miscurl\": [\n      \"https://www.defcon.org/images/defcon-15/dc15-presentations/dc-15-demott_enbody_and_punch.pdf\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"EL3XIR\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Christian Lindenmeier\",\n      \"Mathias Payer\",\n      \"Marcel Busch\"\n    ],\n    \"toolurl\": \"https://github.com/HexHive/EL3XIR\",\n    \"title\": \"EL3XIR: Fuzzing COTS Secure Monitors\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL++\",\n      \"TriforceAFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-lindenmeier.pdf\"\n    ]\n  },\n  {\n    \"name\": \"EMS\",\n    \"year\": 2022,\n    \"author\": [\n      \"Chenyang Lyu\",\n      \"Shouling Ji\",\n      \"Xuhong Zhang\",\n      \"Hong Liang\",\n      \"Binbin Zhao\",\n      \"Kangjie Lu\",\n      \"Raheem Beyah\"\n    ],\n    \"title\": \"EMS: History-Driven Mutation for Coverage-based Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://nesa.zju.edu.cn/download/lcy_pdf_ems_ndss22.pdf\"\n    ],\n    \"toolurl\": \"https://github.com/puppet-meteor/EMS\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"MOPT\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Echidna\",\n    \"year\": 2018,\n    \"author\": [\n      \"Crytic\"\n    ],\n    \"toolurl\": \"https://github.com/crytic/echidna\",\n    \"targets\": [\n      \"EVM\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Eclipser\",\n    \"year\": 2019,\n    \"author\": [\n      \"Jaeseung Choi\",\n      \"Joonun Jang\",\n      \"Choongwoo Han\",\n      \"Sang Kil Cha\"\n    ],\n    \"title\": \"Grey-box Concolic Testing on Binary Code\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"toolurl\": \"https://github.com/SoftSec-KAIST/Eclipser\",\n    \"miscurl\": [\n      \"https://softsec.kaist.ac.kr/~jschoi/data/icse2019.pdf\"\n    ],\n    \"targets\": [\n      \"Argument\",\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"SAGE\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"EcoFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Tai Yue\",\n      \"Pengfei Wang\",\n      \"Yong Tang\",\n      \"Enze Wang\",\n      \"Bo Yu\",\n      \"Kai Lu\",\n      \"Xu Zhou\"\n    ],\n    \"title\": \"EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/MoonLight-SteinsGate/EcoFuzz\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20-yue.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFLFast\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"EcuFuzz\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"SHiFT\"\n    ],\n    \"author\": [\n      \"Qicai Chen\",\n      \"Kun Hu\",\n      \"Sichen Gong\",\n      \"Bihuan Chen\",\n      \"Zikui Kong\",\n      \"Haowen Jiang\",\n      \"Bingkun Sun\",\n      \"You Lu\",\n      \"Xin Peng\"\n    ],\n    \"title\": \"Structure-Aware, Diagnosis-Guided ECU Firmware Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3728914\"\n    ],\n    \"keywords\": [\n      \"ECU\"\n    ]\n  },\n  {\n    \"name\": \"EnFuzz\",\n    \"year\": 2019,\n    \"author\": [\n      \"Yuanliang Chen\",\n      \"Yu Jiang\",\n      \"Fuchen Ma\",\n      \"Jie Liang\",\n      \"Mingzhe Wang\",\n      \"Chijin Zhou\",\n      \"Xun Jiao\",\n      \"Zhuo Su\"\n    ],\n    \"title\": \"EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/enfuzz/enfuzz\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec19-chen-yuanliang.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"radamsa\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"EnclaveFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"SGXFuzz\"\n    ],\n    \"author\": [\n      \"Liheng Chen\",\n      \"Zheming Li\",\n      \"Zheyu Ma\",\n      \"Yuan Li\",\n      \"Baojian Chen\",\n      \"Chao Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/LeoneChen/EnclaveFuzz\",\n    \"title\": \"EnclaveFuzz: Finding Vulnerabilities in SGX Applications\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2024-819-paper.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Entropic\",\n    \"year\": 2020,\n    \"author\": [\n      \"Marcel Böhme\",\n      \"Valentin J.M. Manès\",\n      \"Sang Kil Cha\"\n    ],\n    \"title\": \"Boosting Fuzzer Efficiency: An Information Theoretic Perspective\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"toolurl\": \"https://github.com/llvm/llvm-project/commit/e2e38fca64e49d684de0b100437fe2f227f8fcdd\",\n    \"miscurl\": [\n      \"https://mboehme.github.io/paper/FSE20.Entropy.pdf\"\n    ],\n    \"targets\": [\n      \"Lib\"\n    ],\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"EnvFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFLNet\"\n    ],\n    \"author\": [\n      \"Ruijie Meng\",\n      \"Gregory J. Duck\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"toolurl\": \"https://github.com/GJDuck/EnvFuzz\",\n    \"title\": \"Program Environment Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2404.13951\"\n    ]\n  },\n  {\n    \"name\": \"FANS\",\n    \"year\": 2020,\n    \"author\": [\n      \"Baozheng Liu\",\n      \"Chao Zhang\",\n      \"Guang Gong\",\n      \"Yishun Zeng\",\n      \"Haifeng Ruan\",\n      \"Jianwei Zhuge\"\n    ],\n    \"title\": \"FANS: Fuzzing Android Native System Services via Automated Interface Analysis\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/iromise/fans\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20fall_liu_prepub.pdf\"\n    ],\n    \"targets\": [\n      \"API\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"FAST\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Specification\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Ru Ji\",\n      \"Meng Xu\"\n    ],\n    \"title\": \"Finding Specification Blind Spots via Fuzz Testing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2023/933600c708/1Nrc04SNlCw\"\n    ],\n    \"keywords\": [\n      \"fuzzing\",\n      \"mutation testing\"\n    ]\n  },\n  {\n    \"name\": \"FIFUZZ\",\n    \"year\": 2020,\n    \"author\": [\n      \"Zu-Ming Jiang\",\n      \"Jia-Ju Bai\",\n      \"Kangjie Lu\",\n      \"Shi-Min Hu\"\n    ],\n    \"title\": \"Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www-users.cs.umn.edu/~kjlu/papers/fifuzz.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"FIRM-AFL\",\n    \"year\": 2019,\n    \"author\": [\n      \"Yaowen Zheng\",\n      \"Ali Davanian\",\n      \"Heng Yin\",\n      \"Chengyu Song\",\n      \"Hongsong Zhu\",\n      \"Limin Sun\"\n    ],\n    \"title\": \"FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/zyw-200/FirmAFL\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"TriforceAFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"FLAX\",\n    \"year\": 2010,\n    \"author\": [\n      \"Prateek Saxena\",\n      \"Steve Hanna\",\n      \"Pongsin Poosankam\",\n      \"Dawn Song\"\n    ],\n    \"title\": \"FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"http://webblaze.cs.berkeley.edu/2010/flax/flax.pdf\"\n    ],\n    \"targets\": [\n      \"Web\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"FLUX\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"LibFuzzer\",\n      \"LangFuzz\"\n    ],\n    \"author\": [\n      \"Eric Liu\",\n      \"Shengjie Xu\",\n      \"David Lie\"\n    ],\n    \"toolurl\": \"https://github.com/ericliuu/flux\",\n    \"title\": \"FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"https://security.csl.toronto.edu/wp-content/uploads/2023/09/eliu-ase2023-flux.pdf\"\n    ]\n  },\n  {\n    \"name\": \"FOE\",\n    \"year\": 2012,\n    \"author\": [\n      \"CERT\"\n    ],\n    \"toolurl\": \"https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=515311\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"BFF\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"FORKY\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Blockchain\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"LOKI\"\n    ],\n    \"author\": [\n      \"Seongmin Kim\",\n      \"Jaeseong Kwon\",\n      \"Kihong Heo\",\n      \"Juneyoung Lee\"\n    ],\n    \"toolurl\": \"https://github.com/NetSP-KAIST/forky\",\n    \"title\": \"Fork State-Aware Differential Fuzzing for Blockchain Consensus Implementations\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/document/11029786\"\n    ],\n    \"keywords\": [\n      \"blockchain\",\n      \"differential testing\"\n    ]\n  },\n  {\n    \"name\": \"FOX\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Dongdong She\",\n      \"Adam Storek\",\n      \"Yuchong Xie\",\n      \"Seoyoung Kweon\",\n      \"Prashast Srivastava\",\n      \"Suman Jana\"\n    ],\n    \"toolurl\": \"https://github.com/FOX-Fuzz/FOX\",\n    \"title\": \"FOX: Coverage-guided Fuzzing as Online Stochastic Control\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2406.04517\"\n    ],\n    \"keywords\": [\n      \"frontier branch\"\n    ]\n  },\n  {\n    \"name\": \"FUTURE\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"NablaFuzz\"\n    ],\n    \"author\": [\n      \"Zhiyuan Li\",\n      \"Jingzheng Wu\",\n      \"Xiang Ling\",\n      \"Tianyue Luo\",\n      \"Zhiqing Rui\",\n      \"Yanjun Wu\"\n    ],\n    \"toolurl\": \"https://github.com/Redmept1on/FUTURE\",\n    \"title\": \"The Seeds of the FUTURE Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/abs/2412.01317\"\n    ],\n    \"keywords\": [\n      \"deep learning libraries\",\n      \"LLM\",\n      \"differential testing\"\n    ]\n  },\n  {\n    \"name\": \"FUZZPD\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"IoTFuzzer\"\n    ],\n    \"author\": [\n      \"Kyungtae Kim\",\n      \"Sungwoo Kim\",\n      \"Kevin R. B. Butler\",\n      \"Antonio Bianchi\",\n      \"Rick Kennell\",\n      \"Dave (Jing) Tian\"\n    ],\n    \"toolurl\": \"https://github.com/purseclab/fuzzpd\",\n    \"title\": \"Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-kim-kyungtae.pdf\"\n    ]\n  },\n  {\n    \"name\": \"FUZZUSB\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Kyungtae Kim\",\n      \"Taegyu Kim\",\n      \"Ertza Warraich\",\n      \"Byoungyoung Lee\"\n    ],\n    \"toolurl\": \"https://github.com/purseclab/fuzzusb\",\n    \"title\": \"FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2022/131600a632/1A4Q3mz4uLm\"\n    ]\n  },\n  {\n    \"name\": \"FairFuzz\",\n    \"year\": 2018,\n    \"author\": [\n      \"Caroline Lemieux\",\n      \"Koushik Sen\"\n    ],\n    \"title\": \"FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/carolemieux/afl-rb/\",\n    \"miscurl\": [\n      \"https://www.carolemieux.com/fairfuzz-ase18.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Favocado\",\n    \"year\": 2021,\n    \"author\": [\n      \"Sung Ta Dinh\",\n      \"Haehyun Cho\",\n      \"Kyle Martin\",\n      \"Adam Oest\",\n      \"Kyle Zeng\",\n      \"Alexandros Kapravelos\",\n      \"Gail-Joon Ahn\",\n      \"Tiffany Bao\",\n      \"Ruoyu Wang\",\n      \"Adam Doupé\",\n      \"Yan Shoshitaishvili\"\n    ],\n    \"title\": \"Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/favocado/Favocado\",\n    \"miscurl\": [\n      \"https://sefcom.asu.edu/publications/favocado-ndss21.pdf\"\n    ],\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"references\": [\n      \"CodeAlchemist\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"FileFuzz\",\n    \"year\": 2005,\n    \"author\": [\n      \"Michael Sutton\",\n      \"Adam Greene\"\n    ],\n    \"title\": \"The Art of File Format Fuzzing\",\n    \"booktitle\": \"Proceedings of the Black Hat Asia\",\n    \"toolurl\": \"https://packetstormsecurity.com/files/download/39626/FileFuzz.zip\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"SPIKE\",\n      \"SPIKEfile\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"FishFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFLGo\",\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Han Zheng\",\n      \"Jiayuan Zhang\",\n      \"Yuhang Huang\",\n      \"Zezhong Ren\",\n      \"He Wang\",\n      \"Chunjie Cao\",\n      \"Yuqing Zhang\",\n      \"Flavio Toffalini\",\n      \"Mathias Payer\"\n    ],\n    \"toolurl\": \"https://github.com/HexHive/FishFuzz\",\n    \"title\": \"FishFuzz: Catch Deeper Bugs by Throwing Larger Nets\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-zheng.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Flakjack\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Arvind S Raj\",\n      \"Wil Gibbs\",\n      \"Fangzhou Dong\",\n      \"Jayakrishna Menon Vadayath\",\n      \"Michael Tompkins\",\n      \"Steven Wirsz\",\n      \"Yibo Liu\",\n      \"Zhenghao Hu\",\n      \"Chang Zhu\",\n      \"Gokulkrishna Praveen Menon\",\n      \"Brendan Dolan-Gavitt\",\n      \"Adam Doupé\",\n      \"Ruoyu Wang\",\n      \"Yan Shoshitaishvili\",\n      \"Tiffany Bao\"\n    ],\n    \"toolurl\": \"https://github.com/sefcom/flakjack\",\n    \"title\": \"Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\"\n  },\n  {\n    \"name\": \"Fluffy\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Blockchain\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Youngseok Yang\",\n      \"Taesoo Kim\",\n      \"Byung-Gon Chun\"\n    ],\n    \"toolurl\": \"https://github.com/snuspl/fluffy\",\n    \"title\": \"Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/osdi21-yang.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Frankenstein\",\n    \"year\": 2020,\n    \"author\": [\n      \"Jan Ruge\",\n      \"Jiska Classen\",\n      \"Francesco Gringoli\",\n      \"Matthias Hollick\"\n    ],\n    \"title\": \"Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20-ruge.pdf\"\n    ],\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"FreeDom\",\n    \"year\": 2020,\n    \"author\": [\n      \"Wen Xu\",\n      \"Soyeon Park\",\n      \"Taesoo Kim\"\n    ],\n    \"title\": \"FreeDom: Engineering a State-of-the-Art DOM Fuzzer\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://github.com/sslab-gatech/freedom\",\n    \"miscurl\": [\n      \"https://gts3.org/assets/papers/2020/xu:freedom.pdf\"\n    ],\n    \"targets\": [\n      \"DOM\"\n    ],\n    \"references\": [\n      \"Dharma\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"FreeFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Anjiang Wei\",\n      \"Yinlin Deng\",\n      \"Chenyuan Yang\",\n      \"Lingming Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/ise-uiuc/FreeFuzz\",\n    \"title\": \"Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://cs.stanford.edu/~anjiang/papers/WeiETAL22FreeFuzz.pdf\"\n    ]\n  },\n  {\n    \"name\": \"FreeWavm\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"WebAssembly\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Peng Qian\",\n      \"Xinlei Ying\",\n      \"Jiashui Wang\",\n      \"Long Liu\",\n      \"Lun Zhang\",\n      \"Jianhai Chen\",\n      \"Qinming He\"\n    ],\n    \"toolurl\": \"https://github.com/Messi-Q/FreeWavm\",\n    \"title\": \"FreeWavm: Enhanced WebAssembly Runtime Fuzzing Guided by Parse Tree Mutation and Snapshot\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3728877\"\n    ]\n  },\n  {\n    \"name\": \"Fuzz4All\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"YARPGen\",\n      \"ChatAFL\"\n    ],\n    \"author\": [\n      \"Chunqiu Steven Xia\",\n      \"Matteo Paltenghi\",\n      \"Jia Le Tian\",\n      \"Michael Pradel\",\n      \"Lingming Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/fuzz4all/fuzz4all\",\n    \"title\": \"Fuzz4All: Universal Fuzzing with Large Language Models\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2308.04748\"\n    ],\n    \"keywords\": [\n      \"LLM\"\n    ]\n  },\n  {\n    \"name\": \"FuzzBALL\",\n    \"year\": 2011,\n    \"author\": [\n      \"Domagoj Babic\",\n      \"Lorenzo Martignoni\",\n      \"Stephen McCamant\",\n      \"Dawn Song\"\n    ],\n    \"title\": \"Statically-Directed Dynamic Automated Test Generation\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"toolurl\": \"https://github.com/bitblaze-fuzzball/fuzzball\",\n    \"miscurl\": [\n      \"http://bitblaze.cs.berkeley.edu/papers/testgen-issta11.pdf\",\n      \"https://apps.dtic.mil/dtic/tr/fulltext/u2/a587051.pdf\",\n      \"http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.261.2500&rep=rep1&type=pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"TaintScope\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"FuzzDelSol\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Solana Smart Contract\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"LibAFL\"\n    ],\n    \"author\": [\n      \"Sven Smolka\",\n      \"Jens-Rene Giesen\",\n      \"Pascal Winkler\",\n      \"Oussama Draissi\",\n      \"Lucas Davi\",\n      \"Ghassan Karame\",\n      \"Klaus Pohl\"\n    ],\n    \"title\": \"Fuzz on the Beach: Fuzzing Solana Smart Contracts\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/10.1145/3576915.3623178\"\n    ]\n  },\n  {\n    \"name\": \"FuzzFlow\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"JS Engine\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Haoran Xu\",\n      \"Zhiyuan Jiang\",\n      \"Yongjun Wang\",\n      \"Shuhui Fan\",\n      \"Shenglin Xu\",\n      \"Peidai Xie\",\n      \"Shaojing Fu\",\n      \"Mathias Payer\"\n    ],\n    \"toolurl\": \"https://github.com/walkcreate/FuzzFlow\",\n    \"title\": \"Fuzzing JavaScript Engines with a Graph-based IR\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3658644.3690336\"\n    ],\n    \"references\": [\n      \"Fuzzilli\"\n    ],\n    \"keywords\": [\n      \"js\",\n      \"browser\"\n    ]\n  },\n  {\n    \"name\": \"FuzzGPT\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Deep Learning (DL) libraries\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"FreeFuzz\",\n      \"DeepREL\"\n    ],\n    \"author\": [\n      \"Yinlin Deng\",\n      \"Chunqiu Steven Xia\",\n      \"Chenyuan Yang\",\n      \"Shizhuo Dylan Zhang\",\n      \"Shujing Yang\",\n      \"Lingming Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/ise-uiuc/FuzzGPT\",\n    \"title\": \"Large Language Models are Edge-Case Generators: Crafting Unusual Programs for Fuzzing Deep Learning Libraries\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3597503.3623343\"\n    ],\n    \"keywords\": [\n      \"Deep Learning\",\n      \"libraries\"\n    ]\n  },\n  {\n    \"name\": \"FuzzInMem\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Xuwei Liu\",\n      \"Wei You\",\n      \"Yepeng Ye\",\n      \"Zhuo Zhang\",\n      \"Jianjun Huang\",\n      \"Xiangyu Zhang\"\n    ],\n    \"title\": \"FuzzInMem: Fuzzing Programs via In-memory Structures\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"http://youwei.site/papers/ICSE2024.pdf\"\n    ],\n    \"keywords\": [\n      \"PDF\"\n    ]\n  },\n  {\n    \"name\": \"FuzzJIT\",\n    \"year\": 2023,\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Junjie Wang\",\n      \"Zhiyi Zang\",\n      \"Shuang Liu\",\n      \"Xiaoning Du\",\n      \"Junjie Chen\"\n    ],\n    \"toolurl\": \"https://github.com/SpaceNaN/fuzzjit\",\n    \"title\": \"FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Fuzzilli\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-wang-junjie.pdf\"\n    ]\n  },\n  {\n    \"name\": \"FuzzNG\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Alexander Bulekov\",\n      \"Bandan Das\",\n      \"Stefan Hajnoczi\",\n      \"Manuel Egele\"\n    ],\n    \"toolurl\": \"https://github.com/BUseclab/FuzzNG\",\n    \"title\": \"No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f688_paper.pdf\"\n    ]\n  },\n  {\n    \"name\": \"FuzzOrigin\",\n    \"year\": 2022,\n    \"targets\": [\n      \"DOM\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Sunwoo Kim\",\n      \"Young Min Kim\",\n      \"Jaewon Hur\",\n      \"Suhwan Song\",\n      \"Gwangmu Lee\",\n      \"Byoungyoung Lee\"\n    ],\n    \"toolurl\": \"https://github.com/compsec-snu/fuzzorigin\",\n    \"title\": \"FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"DOMFuzz\",\n      \"Fuzzilli\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-kim.pdf\"\n    ]\n  },\n  {\n    \"name\": \"FuzzUEr\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"LibAFL\"\n    ],\n    \"author\": [\n      \"Connor Glosner\",\n      \"Aravind Machiry\"\n    ],\n    \"toolurl\": \"https://github.com/BreakingBoot/FuzzUEr\",\n    \"title\": \"FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2025-400-paper.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Fuzzbox\",\n    \"year\": 2008,\n    \"author\": [\n      \"David Thiel\"\n    ],\n    \"title\": \"Exposing Vulnerabilities in Media Software\",\n    \"booktitle\": \"Proceedings of the Black Hat USA\",\n    \"toolurl\": \"https://github.com/iSECPartners/fuzzbox\",\n    \"miscurl\": [\n      \"https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/isec_thiel_exposing_vulnerabilities_media_software_0.pdf\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Fuzzilli\",\n    \"year\": 2019,\n    \"author\": [\n      \"Samuel Groß\",\n      \"Simon Koch\",\n      \"Lukas Bernhard\",\n      \"Thorsten Holz\",\n      \"Martin Johns\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"title\": \"FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/googleprojectzero/fuzzilli\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f290_paper.pdf\",\n      \"https://saelo.github.io/presentations/offensivecon_19_fuzzilli.pdf\",\n      \"https://saelo.github.io/papers/thesis.pdf\"\n    ],\n    \"color\": \"greybox\",\n    \"keywords\": [\n      \"JavaScript\"\n    ]\n  },\n  {\n    \"name\": \"Fuzzolic\",\n    \"year\": 2021,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\",\n    \"author\": [\n      \"Borzacchiello\",\n      \"Luca and Coppa\",\n      \"Emilio and Demetrescu\",\n      \"Camil\"\n    ],\n    \"toolurl\": \"https://season-lab.github.io/fuzzolic/\",\n    \"title\": \"Fuzzing Symbolic Expressions\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"QSYM\"\n    ],\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2102.06580.pdf\"\n    ],\n    \"keywords\": [\n      \"SMT\"\n    ]\n  },\n  {\n    \"name\": \"Fuzztruction\",\n    \"year\": 2023,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Nils Bars\",\n      \"Moritz Schloegel\",\n      \"Tobias Scharnowski\",\n      \"Nico Schiller\",\n      \"Thorsten Holz\"\n    ],\n    \"toolurl\": \"https://github.com/fuzztruction/fuzztruction\",\n    \"title\": \"Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-bars.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Fuzztruction-Net\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Fuzztruction\"\n    ],\n    \"author\": [\n      \"Nils Bars\",\n      \"Moritz Schloegel\",\n      \"Nico Schiller\",\n      \"Lukas Bernhard\"\n    ],\n    \"toolurl\": \"https://github.com/fuzztruction/fuzztruction-net\",\n    \"title\": \"No Peer, no Cry: Network Application Fuzzing via Fault Injection\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\"\n  },\n  {\n    \"name\": \"Fuzzware\",\n    \"year\": \"2022\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"whitebox\",\n    \"author\": [\n      \"Tobias Scharnowski\",\n      \"Nils Bars\",\n      \"Moritz Schloegel\",\n      \"Eric Gustafson\",\n      \"Marius Muench\",\n      \"Giovanni Vigna\",\n      \"Christopher Kruegel\",\n      \"Thorsten Holz\",\n      \"Ali Abbasi\"\n    ],\n    \"toolurl\": \"https://github.com/fuzzware-fuzzer/fuzzware\",\n    \"title\": \"Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-scharnowski.pdf\"\n    ]\n  },\n  {\n    \"name\": \"GLADE\",\n    \"year\": 2015,\n    \"author\": [\n      \"Osbert Bastani\",\n      \"Rahul Sharma\",\n      \"Alex Aiken\",\n      \"Percy Liang\"\n    ],\n    \"title\": \"Synthesizing Program Input Grammars\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"toolurl\": \"https://github.com/obastani/glade\",\n    \"miscurl\": [\n      \"https://obastani.github.io/docs/pldi17.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"CSmith\",\n      \"LangFuzz\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"GLeeFuzz\",\n    \"year\": 2023,\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Hui Peng\",\n      \"Zhihao Yao\",\n      \"Ardalan Amiri Sani\",\n      \"Dave (Jing) Tian\",\n      \"Mathias Payer\"\n    ],\n    \"toolurl\": \"https://github.com/HexHive/GLeeFuzz\",\n    \"title\": \"GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Favocado\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-peng.pdf\"\n    ]\n  },\n  {\n    \"name\": \"GPF\",\n    \"year\": 2005,\n    \"author\": [\n      \"Jared Demott\"\n    ],\n    \"toolurl\": \"https://www.ee.oulu.fi/roles/ouspg/GPF\",\n    \"targets\": [\n      \"File\",\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"GRIFFIN\",\n    \"year\": 2022,\n    \"targets\": [\n      \"DBMS\"\n    ],\n    \"toolurl\": \"https://github.com/Griffin-2022/Griffin\",\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Jingzhou Fu\",\n      \"Jie Liang\",\n      \"Zhiyong Wu\",\n      \"Mingzhe Wang\",\n      \"Yu Jiang\"\n    ],\n    \"title\": \"GRIFFIN: Grammar-Free DBMS Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"http://www.wingtecher.com/themes/WingTecherResearch/assets/papers/ASE22-Griffin.pdf\"\n    ]\n  },\n  {\n    \"name\": \"GRR\",\n    \"year\": 2016,\n    \"author\": [\n      \"Peter Goodman\"\n    ],\n    \"toolurl\": \"https://github.com/trailofbits/grr\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"radamsa\"\n    ],\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/document/8328981\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"GRT\",\n    \"year\": 2015,\n    \"author\": [\n      \"Lei Ma\",\n      \"Cyrille Artho\",\n      \"Cheng Zhang\",\n      \"Hiroyuki Sato\",\n      \"Johannes Gmeiner\",\n      \"Rudolf Ramler\"\n    ],\n    \"title\": \"GRT: Program-Analysis-Guided Random Testing\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/abstract/document/7372010\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"GraphFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Harrison Green\",\n      \"Thanassis Avgerinos\"\n    ],\n    \"toolurl\": \"https://github.com/ForAllSecure/GraphFuzz\",\n    \"title\": \"GraphFuzz: Library API Fuzzing with Lifetime-aware Dataflow Graphs\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"miscurl\": [\n      \"https://hgarrereyn.github.io/GraphFuzz/research/GraphFuzz_ICSE_2022.pdf\"\n    ]\n  },\n  {\n    \"name\": \"GreyOne\",\n    \"year\": 2020,\n    \"author\": [\n      \"Shuitao Gan\",\n      \"Chao Zhang\",\n      \"Peng Chen\",\n      \"Bodong Zhao\",\n      \"Xiaojun Qin\",\n      \"Dong Wu\",\n      \"Zuoning Chen\"\n    ],\n    \"title\": \"GREYONE: Data Flow Sensitive Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20spring_gan_prepub.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"VUzzer\",\n      \"Redqueen\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Grimoire\",\n    \"year\": 2019,\n    \"author\": [\n      \"Tim Blazytko\",\n      \"Cornelius Aschermann\",\n      \"Moritz Schlögel\",\n      \"Ali Abbasi\",\n      \"Sergej Schumilo\",\n      \"Simon Wörner\",\n      \"Thorsten Holz\"\n    ],\n    \"title\": \"GRIMOIRE: Synthesizing Structure while Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Annual Technical Conference\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec19-blazytko.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"Redqueen\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"GzFuzz\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Robotic Simulator\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Zhilei Ren\",\n      \"Yitao Li\",\n      \"Xiaochen Li\",\n      \"Guanxiao Qi\",\n      \"Jifeng Xuan\",\n      \"He Jiang\"\n    ],\n    \"toolurl\": \"https://github.com/liyitao-code/GzFuzz\",\n    \"title\": \"Reinforcement Learning-based Fuzz Testing for the Gazebo Robotic Simulator\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/10.1145/3728942\"\n    ],\n    \"keywords\": [\n      \"Reinforcement Learning\"\n    ]\n  },\n  {\n    \"name\": \"HFL\",\n    \"year\": 2020,\n    \"author\": [\n      \"Kyungtae Kim\",\n      \"Dae R. Jeong\",\n      \"Chung Hwan Kim\",\n      \"Yeongjin Jang\",\n      \"Insik Shin\",\n      \"Byoungyoung Lee\"\n    ],\n    \"title\": \"HFL: Hybrid Fuzzing on the Linux Kernel\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"HFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Heterogeneous applications\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"HeteroFuzz\"\n    ],\n    \"author\": [\n      \"Jiyuan Wang\",\n      \"Qian Zhang\",\n      \"Hongbo Rong\",\n      \"Guoqing Harry Xu\",\n      \"Miryung Kim\"\n    ],\n    \"toolurl\": \"https://github.com/wjy99-c/HFuzz\",\n    \"title\": \"Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous Applications\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://web.cs.ucla.edu/~wangjiyuan/research/FSE2023_HFuzz.pdf\"\n    ]\n  },\n  {\n    \"name\": \"HTFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Yuanping Yu\",\n      \"Xiangkun Jia\",\n      \"Yuwei Liu\",\n      \"Yanhao Wang\",\n      \"Qian Sang\",\n      \"Chao Zhang\",\n      \"Purui Su\"\n    ],\n    \"toolurl\": \"https://github.com/sharedata21/HTFuzz\",\n    \"title\": \"HTFuzz: Heap Operation Sequence Sensitive Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"references\": [\n      \"AFL\",\n      \"MOPT\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3551349.3560415\"\n    ]\n  },\n  {\n    \"name\": \"HYPER-CUBE\",\n    \"year\": 2020,\n    \"author\": [\n      \"Sergej Schumilo\",\n      \"Cornelius Aschermann\",\n      \"Ali Abbasi\",\n      \"Simon Wörner\",\n      \"Thorsten Holz\"\n    ],\n    \"title\": \"HYPER-CUBE: High-Dimensional Hypervisor Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"references\": [\n      \"CHIPSEC\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Halo\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"author\": [\n      \"Heqing Huang\",\n      \"Anshunkang Zhou\",\n      \"Mathias Payer\",\n      \"Charles Zhang\"\n    ],\n    \"title\": \"Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2024/313000a142/1Ub23ZRRhRu\"\n    ],\n    \"keywords\": [\n      \"directed fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"Harvey\",\n    \"year\": 2020,\n    \"author\": [\n      \"Valentin Wüstholz\",\n      \"Maria Christakis\"\n    ],\n    \"title\": \"Targeted Greybox Fuzzing with Static Lookahead Analysis\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"EVM\"\n    ],\n    \"references\": [\n      \"AFLGo\",\n      \"ContractFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Hawkeye\",\n    \"year\": 2018,\n    \"author\": [\n      \"Hongxu Chen\",\n      \"Yinxing Xue\",\n      \"Yuekang Li\",\n      \"Bihuan Chen\",\n      \"Xiaofei Zie\",\n      \"Xiuheng Wu\",\n      \"Yang Liu\"\n    ],\n    \"title\": \"Hawkeye: Towards a Desired Directed Grey-box Fuzzer\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"HeteroFuzz\",\n    \"year\": 2021,\n    \"author\": [\n      \"Qian Zhang\",\n      \"Jiyuan Wang\",\n      \"Miryung Kim\"\n    ],\n    \"title\": \"HeteroFuzz: Fuzz Testing to Detect Platform Dependent Divergence for Heterogeneous Applications\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://web.cs.ucla.edu/~wangjiyuan/research/FSE2021_heterofuzz.pdf\"\n    ],\n    \"targets\": [\n      \"Heterogeneous applications\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"HiCOND\",\n    \"year\": 2019,\n    \"author\": [\n      \"Junjie Chen\",\n      \"Guangcheng Wang\",\n      \"Dan Ha\",\n      \"Yingfei Xiong\",\n      \"Hongyu Zhang\",\n      \"Lu Zhang\"\n    ],\n    \"title\": \"History-Guided Configuration Diversification for Compiler Test-Program Generation\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/JunjieChen/HiCOND\",\n    \"miscurl\": [\n      \"https://xiongyingfei.github.io/papers/ASE19b.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"CSmith\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Hodor\",\n    \"year\": 2016,\n    \"author\": [\n      \"Braden Hollembaek\"\n    ],\n    \"toolurl\": \"https://github.com/nccgroup/Hodor\",\n    \"targets\": [\n      \"File\",\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Hoedur\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Tobias Scharnowski\",\n      \"Simon Wörner\",\n      \"Felix Buchmann\",\n      \"Nils Bars\"\n    ],\n    \"toolurl\": \"https://github.com/fuzzware-fuzzer/hoedur\",\n    \"title\": \"Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-scharnowski.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Hopper\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"RESTler\"\n    ],\n    \"author\": [\n      \"Peng Chen\",\n      \"Yuxuan Xie\",\n      \"Yunlong Lyu\",\n      \"Yuxiao Wang\",\n      \"Hao Chen\"\n    ],\n    \"toolurl\": \"https://github.com/FuzzAnything/Hopper\",\n    \"title\": \"Hopper: Interpretative Fuzzing for Libraries\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3576915.3616610\"\n    ]\n  },\n  {\n    \"name\": \"HotFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"William Blair\",\n      \"Andrea Mambretti\",\n      \"Sajjad Arshad\",\n      \"Michael Weissbacher\",\n      \"William Robertson\",\n      \"Engin Kirda\",\n      \"Manuel Egele\"\n    ],\n    \"title\": \"HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://arxiv.org/pdf/2002.03416.pdf\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"references\": [\n      \"SlowFuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Householder\",\n    \"year\": 2012,\n    \"title\": \"Probability-Based Parameter Selection for Black-Box Fuzz Testing\",\n    \"author\": [\n      \"Allen D. Householder\",\n      \"Jonathan M. Foote\"\n    ],\n    \"miscurl\": [\n      \"https://resources.sei.cmu.edu/asset_files/TechnicalNote/2012_004_001_28152.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"BFF\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"HubFuzzer\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Xiaoyue Ma\",\n      \"Qiang Zeng\",\n      \"Haotian Chi\",\n      \"Lannan Luo\"\n    ],\n    \"toolurl\": \"https://github.com/iot-sec23/HubFuzzer\",\n    \"title\": \"No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware\",\n    \"booktitle\": \"Proceedings of the International Conference on Mobile Systems, Applications, and Services\",\n    \"references\": [\n      \"Snipuzz\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3581791.3596857\"\n    ]\n  },\n  {\n    \"name\": \"HyDiff\",\n    \"year\": 2020,\n    \"author\": [\n      \"Yannic Noller\",\n      \"Corina S. Păsăreanu\",\n      \"Marcel Böhme\",\n      \"Youcheng Sun\",\n      \"Hoang Lam Nguyen\",\n      \"Lars Grunske\"\n    ],\n    \"title\": \"HyDiff: Hybrid Differential Software Analysis\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"Side-channel\"\n    ],\n    \"toolurl\": \"https://github.com/yannicnoller/hydiff\",\n    \"references\": [\n      \"DifFuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"HyPFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Chen Chen\",\n      \"Rahul Kande\",\n      \"Nathan Nguyen\",\n      \"Flemming Andersen\",\n      \"Aakash Tyagi\",\n      \"Ahmad-Reza Sadeghi\",\n      \"Jeyavijayan Rajendran\"\n    ],\n    \"title\": \"HyPFuzz: Formal-Assisted Processor Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"TheHuzz\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-chen-chen.pdf\"\n    ]\n  },\n  {\n    \"name\": \"HyperFuzzer\",\n    \"year\": 2021,\n    \"author\": [\n      \"Xinyang Ge\",\n      \"Ben Niu\",\n      \"Rober Brotzman\",\n      \"Yaohui Chen\",\n      \"HyungSeok Han\",\n      \"Patrice Godefroid\",\n      \"Weidong Cui\"\n    ],\n    \"title\": \"HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"SAGE\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"HyperPill\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Alexander Bulekov\",\n      \"Qiang Liu\",\n      \"Manuel Egele\",\n      \"Mathias Payer\"\n    ],\n    \"toolurl\": \"https://github.com/HexHive/HyperPill\",\n    \"title\": \"HyperPill: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Morphuzz\",\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-bulekov.pdf\"\n    ]\n  },\n  {\n    \"name\": \"ICSFuzz\",\n    \"year\": 2021,\n    \"author\": [\n      \"Dimitrios Tychalas\",\n      \"Hadjer Benkraouda\",\n      \"Michail Maniatakos\"\n    ],\n    \"title\": \"ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec21fall-tychalas.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"RVFuzzer\",\n      \"FIRM-AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ICSQuartz\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"ICS\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"ICSFuzz\"\n    ],\n    \"author\": [\n      \"Corban Villa\",\n      \"Constantine Doumanidis\",\n      \"Hithem Lamri\",\n      \"Prashant Hari Narayan Rajput\",\n      \"Michail Maniatakos\"\n    ],\n    \"toolurl\": \"https://github.com/momalab/ICSQuartz\",\n    \"title\": \"ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems\",\n    \"booktitle\": \"Network and Distributed System Security Symposium (NDSS) 2025\",\n    \"journal\": \"NDSS\",\n    \"miscurl\": [\n      \"https://dx.doi.org/10.14722/ndss.2025.240795\"\n    ],\n    \"keywords\": [\n      \"plc\",\n      \"scan cycle\"\n    ]\n  },\n  {\n    \"name\": \"IFIZZ\",\n    \"year\": 2021,\n    \"author\": [\n      \"Penghui Li\",\n      \"Yinxi Liu\",\n      \"Wei Meng\"\n    ],\n    \"title\": \"IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/decentL/iFIZZ-ASE21\",\n    \"miscurl\": [\n      \"https://nesa.zju.edu.cn/download/liu_pdf_ifizz.pdf\"\n    ],\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"references\": [\n      \"FIFUZZ\",\n      \"T-Fuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"IFuzzer\",\n    \"year\": 2016,\n    \"author\": [\n      \"Spandan Veggalam\",\n      \"Sanjay Rawat\",\n      \"Istvan Haller\",\n      \"Herbert Bos\"\n    ],\n    \"title\": \"IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming\",\n    \"booktitle\": \"Proceedings of the European Symposium on Research in Computer Security\",\n    \"toolurl\": \"https://github.com/vspandan/IFuzzer\",\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"references\": [\n      \"LangFuzz\"\n    ],\n    \"color\": \"blackbox\",\n    \"keywords\": [\n      \"JavaScript\"\n    ]\n  },\n  {\n    \"name\": \"ILF\",\n    \"year\": 2019,\n    \"author\": [\n      \"Jingxuan He\",\n      \"Mislav Balunović\",\n      \"Nodar Ambroladze\",\n      \"Petar Tsankov\",\n      \"Martin Vechev\"\n    ],\n    \"title\": \"Learning to Fuzz from Symbolic Execution with Application to Smart Contracts\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://files.sri.inf.ethz.ch/website/papers/ccs19-ilf.pdf\"\n    ],\n    \"toolurl\": \"https://github.com/eth-sri/ilf\",\n    \"targets\": [\n      \"EVM\"\n    ],\n    \"references\": [\n      \"Neuzz\",\n      \"ContractFuzzer\",\n      \"Learn&Fuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"IMF\",\n    \"year\": 2017,\n    \"author\": [\n      \"HyungSeok Han\",\n      \"Sang Kil Cha\"\n    ],\n    \"title\": \"IMF: Inferred Model-based Fuzzer\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://github.com/SoftSec-KAIST/IMF\",\n    \"miscurl\": [\n      \"https://daramg.gift/paper/han-ccs2017.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"IPEA-Fuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Jiameng Shi\",\n      \"Wenqiang Li\",\n      \"Wenwen Wang\",\n      \"Le Guan\"\n    ],\n    \"toolurl\": \"https://github.com/MCUSec/IPEA\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2024-116-paper.pdf\"\n    ],\n    \"title\": \"Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\"\n  },\n  {\n    \"name\": \"IRFuzzer\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Compiler\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"CSmith\"\n    ],\n    \"author\": [\n      \"Yuyang Rong\",\n      \"Zhanghan Yu\",\n      \"Zhenkai Weng\",\n      \"Stephen Neuendorffer\",\n      \"Hao Chen\"\n    ],\n    \"title\": \"IRFuzzer: Specialized Fuzzing for LLVM Backend Code Generation\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/abs/2402.05256\"\n    ],\n    \"keywords\": [\n      \"compiler backend\",\n      \"IR mutation\"\n    ]\n  },\n  {\n    \"name\": \"InputBlaster\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"mobile app\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"APE\"\n    ],\n    \"author\": [\n      \"Zhe Liu\",\n      \"Chunyang Chen\",\n      \"Junjie Wang\",\n      \"Mengzhuo Chen\",\n      \"Boyu Wu\",\n      \"Zhilin Tian\",\n      \"Yuekai Huang\",\n      \"Jun Hu\",\n      \"Qing Wang\"\n    ],\n    \"title\": \"Testing the Limits: Unusual Text Inputs Generation for Mobile App Crash Detection with Large Language Model\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2310.15657\"\n    ],\n    \"keywords\": [\n      \"app\"\n    ]\n  },\n  {\n    \"name\": \"Intender\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"DELTA\"\n    ],\n    \"author\": [\n      \"Jiwon Kim\",\n      \"Benjamin E. Ujcich\",\n      \"Dave (Jing) Tian\"\n    ],\n    \"toolurl\": \"https://github.com/purseclab/intender\",\n    \"title\": \"Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-kim-jiwon.pdf\"\n    ],\n    \"keywords\": [\n      \"Intent-based networking\"\n    ]\n  },\n  {\n    \"name\": \"Intriguer\",\n    \"year\": 2019,\n    \"author\": [\n      \"Mingi Cho\",\n      \"Seoyoung Kim\",\n      \"Taekyoung Kwon\"\n    ],\n    \"title\": \"Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing\",\n    \"miscurl\": [\n      \"https://wcventure.github.io/FuzzingPaper/Paper/CCS19_Intriguer.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"QSYM\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Invivo\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Octavio Galland\",\n      \"Marcel Böhme\"\n    ],\n    \"toolurl\": \"https://github.com/OctavioGalland/afllive\",\n    \"title\": \"Invivo Fuzzing by Amplifying Actual Executions\",\n    \"booktitle\": \"Proceedings of the 46th IEEE/ACM International Conference on Software Engineering (ICSE)\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/document/11029862\"\n    ],\n    \"keywords\": [\n      \"function-level fuzzing\",\n      \"constraint-aware fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"IoTFuzzer\",\n    \"year\": 2018,\n    \"author\": [\n      \"Jiongyi Chen\",\n      \"Wenrui Diao\",\n      \"Qingchuan Zhao\",\n      \"Chaoshun Zuo\",\n      \"Zhiqiang Lin\",\n      \"XiaoFeng Wang\",\n      \"Wing Cheong Lau\",\n      \"Menghan Sun\",\n      \"Ronghai Yang\",\n      \"Kehuan Zhang\"\n    ],\n    \"title\": \"IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://staff.ie.cuhk.edu.hk/~khzhang/my-papers/2018-ndss-iot.pdf\"\n    ],\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"references\": [\n      \"BitFuzz\",\n      \"TaintScope\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"ItyFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Smart Contract\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"SMARTIAN\"\n    ],\n    \"author\": [\n      \"Chaofan Shou\",\n      \"Shangyin Tan\",\n      \"Koushik Sen\"\n    ],\n    \"toolurl\": \"https://github.com/fuzzland/ityfuzz\",\n    \"title\": \"ItyFuzz: Snapshot-Based Fuzzer for Smart Contract\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/10.1145/3597926.3598059\"\n    ]\n  },\n  {\n    \"name\": \"IvySyn\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"FreeFuzz\"\n    ],\n    \"author\": [\n      \"Neophytos Christou\",\n      \"Di Jin\",\n      \"Vaggelis Atlidakis\",\n      \"Baishakhi Ray\",\n      \"Vasileios P. Kemerlis\"\n    ],\n    \"toolurl\": \"https://gitlab.com/brown-ssl/ivysyn\",\n    \"title\": \"IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-christou.pdf\"\n    ]\n  },\n  {\n    \"name\": \"JIGSAW\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\",\n    \"author\": [\n      \"Ju Chen\",\n      \"Jinghan Wang\",\n      \"Chengyu Song\",\n      \"Heng Yin\"\n    ],\n    \"toolurl\": \"https://github.com/R-Fuzz/jigsaw\",\n    \"title\": \"JIGSAW: Efficient and Scalable Path Constraints Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"Angora\"\n    ],\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2022/131600b531/1CIO7Am84aA\"\n    ]\n  },\n  {\n    \"name\": \"JITfuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Compiler\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Mingyuan Wu\",\n      \"Minghai Lu\",\n      \"Heming Cui\",\n      \"Junjie Chen\"\n    ],\n    \"toolurl\": \"https://github.com/lochnagarr/JITFuzz\",\n    \"title\": \"JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"https://lingming.cs.illinois.edu/publications/icse2023e.pdf\"\n    ],\n    \"keywords\": [\n      \"JVM\",\n      \"JIT compilers\"\n    ]\n  },\n  {\n    \"name\": \"JOpFuzzer\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Haoxiang Jia\",\n      \"Ming Wen\",\n      \"Zifan Xie\",\n      \"Xiaochen Guo\",\n      \"Rongxin Wu\",\n      \"Maolin Sun\",\n      \"Kang Chen\",\n      \"Hai Jin\"\n    ],\n    \"title\": \"Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"classming\"\n    ],\n    \"miscurl\": [\n      \"https://justinwm.github.io/paper/ICSE-JOpFuzzer-Checked.pdf\"\n    ],\n    \"keywords\": [\n      \"JVM\",\n      \"JIT compiler\"\n    ]\n  },\n  {\n    \"name\": \"JQF\",\n    \"year\": 2019,\n    \"author\": [\n      \"Rohan Padhye\",\n      \"Caroline Lemieux\",\n      \"Koushik Sen\"\n    ],\n    \"title\": \"JQF: Coverage-Guided Property-Based Testing in Java\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"toolurl\": \"https://github.com/rohanpadhye/JQF\",\n    \"miscurl\": [\n      \"https://people.eecs.berkeley.edu/~rohanpadhye/files/jqf-issta19.pdf\"\n    ],\n    \"targets\": [\n      \"Java\"\n    ],\n    \"references\": [\n      \"Kelinci\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"JSGo\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Application\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Changhua Luo\",\n      \"Penghui Li\",\n      \"Wei Meng\",\n      \"Chao Zhang\"\n    ],\n    \"title\": \"Test Suites Guided Vulnerability Validation for Node.js Applications\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3658644.3690332\"\n    ],\n    \"references\": [\n      \"Witcher\",\n      \"RESTler\",\n      \"MINER\"\n    ],\n    \"keywords\": [\n      \"node js\"\n    ]\n  },\n  {\n    \"name\": \"Janus\",\n    \"year\": 2019,\n    \"author\": [\n      \"Wen xu\",\n      \"Hyungon Moon\",\n      \"Sanidhya Kashyap\",\n      \"Po-Ning Tseng\",\n      \"Taesoo Kim\"\n    ],\n    \"title\": \"Fuzzing File Systems via Two-Dimensional Input Space Exploration\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"miscurl\": [\n      \"https://taesoo.kim/pubs/2019/xu:janus.pdf\"\n    ],\n    \"references\": [\n      \"fsfuzzer\",\n      \"kAFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Jetris\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"JVM\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Yingquan Zhao\",\n      \"Zan Wang\",\n      \"Junjie Chen\",\n      \"Ruifeng Fu\",\n      \"Yanzhou Lu\",\n      \"Tianchang Gao\",\n      \"Haojie Ye\"\n    ],\n    \"title\": \"Program Ingredients Abstraction and Instantiation for Synthesis-based JVM Testing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3658644.3690366\"\n    ],\n    \"references\": [\n      \"classming\"\n    ],\n    \"keywords\": [\n      \"JVM\"\n    ]\n  },\n  {\n    \"name\": \"Jit-Picker\",\n    \"year\": 2022,\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Lukas Bernhard\",\n      \"Tobias Scharnowski\",\n      \"Moritz Schloegel\",\n      \"Tim Blazytko\",\n      \"Thorsten Holz\"\n    ],\n    \"title\": \"Jit-Picking: Differential Fuzzing of JavaScript Engines\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"references\": [\n      \"Fuzzilli\"\n    ],\n    \"miscurl\": [\n      \"https://publications.cispa.saarland/3773/1/2022-CCS-JIT-Fuzzing.pdf\"\n    ]\n  },\n  {\n    \"name\": \"K-Scheduler\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Dongdong She\",\n      \"Abhishek Shah\",\n      \"Suman Jana\"\n    ],\n    \"toolurl\": \"https://github.com/Dongdongshe/K-Scheduler\",\n    \"title\": \"Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2022/131600b558/1CIO87fBXK8\"\n    ]\n  },\n  {\n    \"name\": \"KLEE\",\n    \"year\": 2008,\n    \"author\": [\n      \"Cristian Cadar\",\n      \"Daniel Dunbar\",\n      \"Dawson Engler\"\n    ],\n    \"title\": \"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs\",\n    \"booktitle\": \"Proceedings of the USENIX Symposium on Operating System Design and Implementation\",\n    \"toolurl\": \"https://klee.github.io/\",\n    \"targets\": [\n      \"Argument\",\n      \"File\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"KRAKEN\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Anshunkang Zhou\",\n      \"Heqing Huang\",\n      \"Charles Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/seviezhou/Kraken\",\n    \"title\": \"KRAKEN: Program-Adaptive Parallel Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3728882\"\n    ],\n    \"keywords\": [\n      \"Parallel Fuzzer\"\n    ]\n  },\n  {\n    \"name\": \"KameleonFuzz\",\n    \"year\": 2014,\n    \"author\": [\n      \"Fabien Duchene\",\n      \"Sanjay Rawat\",\n      \"Jean-Luc Richier\",\n      \"Roland Groz\"\n    ],\n    \"title\": \"KameleonFuzz: Evolutionary Fuzzing for Black-box XSS Detection\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Data and Application Security and Privacy\",\n    \"miscurl\": [\n      \"https://dl.acm.org/citation.cfm?id=2557550\"\n    ],\n    \"references\": [\n      \"Doupé et al.\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Kelinci\",\n    \"year\": 2018,\n    \"author\": [\n      \"Rody Kersten\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"toolurl\": \"https://github.com/isstac/kelinci\",\n    \"targets\": [\n      \"Java\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"KernelFuzzer\",\n    \"year\": 2016,\n    \"author\": [\n      \"James Loureiro\",\n      \"Georgi Geshev\"\n    ],\n    \"title\": \"Platform Agnostic Kernel Fuzzing\",\n    \"booktitle\": \"Proceedings of DefCon\",\n    \"toolurl\": \"https://github.com/FSecureLABS/KernelFuzzer\",\n    \"miscurl\": [\n      \"https://labs.f-secure.com/assets/BlogFiles/mwri-Platform-Agnostic-Kernel-Fuzzing-FINAL.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"KextFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"author\": [\n      \"Tingting Yin\",\n      \"Zicong Gao\",\n      \"Zhenghang Xiao\",\n      \"Zheyu Ma\",\n      \"Min Zheng\",\n      \"Chao Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/vul337/KextFuzz\",\n    \"title\": \"KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec23fall-prepub-425-yin-tingting.pdf\"\n    ]\n  },\n  {\n    \"name\": \"KiF\",\n    \"year\": 2007,\n    \"author\": [\n      \"Humberto J. Abdelnur\",\n      \"Radu State\",\n      \"Olivier Festor\"\n    ],\n    \"title\": \"KiF: A Stateful SIP Fuzzer\",\n    \"booktitle\": \"Proceedings of the International Conference on Principles\",\n    \"miscurl\": [\n      \"https://hal.inria.fr/inria-00166947/document\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"references\": [\n      \"SNOOZE\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Kitty\",\n    \"year\": 2016,\n    \"author\": [\n      \"Binyamin Sharet\"\n    ],\n    \"title\": \"Hello Kitty\",\n    \"booktitle\": \"Proceedings of BSides Knoxville\",\n    \"toolurl\": \"https://github.com/cisco-sas/kitty\",\n    \"miscurl\": [\n      \"https://www.youtube.com/watch?v=EKqqQbxZmA4\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"references\": [\n      \"Peach\",\n      \"Sulley\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Krace\",\n    \"year\": 2020,\n    \"author\": [\n      \"Meng Xu\",\n      \"Sanidhya Kashyap\",\n      \"Hanqing Zhao\",\n      \"Taesoo Kim\"\n    ],\n    \"title\": \"KRACE: Data Race Fuzzing for Kernel File Systems\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"Razzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"LABRADOR\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"Snipuzz\",\n      \"FIRM-AFL\"\n    ],\n    \"author\": [\n      \"Hangtian Liu\",\n      \"Shuitao Gan\",\n      \"Chao Zhang\",\n      \"Zicong Gao\",\n      \"Hongqi Zhang\",\n      \"Xiangzhi Wang\",\n      \"Guangming Gao\"\n    ],\n    \"title\": \"LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2024/313000a127/1Ub23HQTJ1C\"\n    ],\n    \"keywords\": [\n      \"IoT\",\n      \"Response Guided\",\n      \"Directed Fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"LL-fuzzer\",\n    \"year\": 2015,\n    \"author\": [\n      \"Chad Spensky\"\n    ],\n    \"toolurl\": \"https://github.com/mit-ll/LL-Fuzzer\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"references\": [\n      \"Sulley\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"LLM-Fuzzer\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"LLM\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Jiahao Yu\",\n      \"Xingwei Lin\",\n      \"Zheng Yu\",\n      \"Xinyu Xing\"\n    ],\n    \"toolurl\": \"https://github.com/sherdencooper/GPTFuzz\",\n    \"title\": \"LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-yu-jiahao.pdf\"\n    ]\n  },\n  {\n    \"name\": \"LLMIF\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"ChatAFL\"\n    ],\n    \"author\": [\n      \"Jincheng Wang\",\n      \"Le Yu\",\n      \"Xiapu Luo\"\n    ],\n    \"title\": \"LLMIF: Augmented Large Language Model for Fuzzing IoT Devices\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2024/313000a196/1WPcYnhN15u\"\n    ],\n    \"keywords\": [\n      \"IoT\",\n      \"LLM\"\n    ]\n  },\n  {\n    \"name\": \"LOKI\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Blockchain\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Fuchen Ma\",\n      \"Yuanliang Chen,Meng Ren\",\n      \"Yuanhang Zhou\",\n      \"Yu Jiang\",\n      \"Ting Chen\",\n      \"Huizhong Li\",\n      \"Jiaguang Sun\"\n    ],\n    \"toolurl\": \"https://github.com/ConsensusFuzz/LOKI\",\n    \"title\": \"LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f78_paper.pdf\"\n    ],\n    \"references\": [\n      \"Fluffy\"\n    ]\n  },\n  {\n    \"name\": \"LTEFuzz\",\n    \"year\": 2019,\n    \"author\": [\n      \"Hongil Kim\",\n      \"Jiho Lee\",\n      \"Eunkyu Lee\",\n      \"Yongdae Kim\"\n    ],\n    \"title\": \"Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"targets\": [\n      \"LTE\"\n    ],\n    \"references\": [\n      \"PROTOS\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"LTL-Fuzzer\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Ruijie Meng\",\n      \"Zhen Dong\",\n      \"Jialin Li\",\n      \"Ivan Beschastnikh\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"toolurl\": \"https://github.com/ltlfuzzer/LTL-Fuzzer\",\n    \"title\": \"Linear-time Temporal Logic guided Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"AFL\",\n      \"AFLGo\"\n    ],\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2109.02312.pdf\"\n    ]\n  },\n  {\n    \"name\": \"LZfuzz\",\n    \"year\": 2008,\n    \"author\": [\n      \"Sergey Bratus\",\n      \"Axel Hansen\",\n      \"Anna Shubina\"\n    ],\n    \"title\": \"LZfuzz: a fast compression-based fuzzer for poorlydocumented protocols\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"Sulley\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"LangFuzz\",\n    \"year\": 2012,\n    \"author\": [\n      \"Christian Holler\",\n      \"Kim Herzig\",\n      \"Andreas Zeller\"\n    ],\n    \"title\": \"Fuzzing with Code Fragments\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final73.pdf\"\n    ],\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"references\": [\n      \"cross_fuzz\",\n      \"jsfunfuzz\"\n    ],\n    \"color\": \"blackbox\",\n    \"keywords\": [\n      \"JavaScript\"\n    ]\n  },\n  {\n    \"name\": \"Learn&Fuzz\",\n    \"year\": 2017,\n    \"author\": [\n      \"Patrice Godefroid\",\n      \"Hila Peleg\",\n      \"Rishabh Singh\"\n    ],\n    \"title\": \"Learn&Fuzz: Machine Learning for Input Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"SAGE\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"LibAFL\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Andrea Fioraldi\",\n      \"Dominik Maier\",\n      \"Dongjia Zhang\",\n      \"Davide Balzarotti\"\n    ],\n    \"toolurl\": \"https://github.com/AFLplusplus/LibAFL\",\n    \"title\": \"LibAFL: A Framework to Build Modular and Reusable Fuzzers\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"https://www.s3.eurecom.fr/docs/ccs22_fioraldi.pdf\"\n    ]\n  },\n  {\n    \"name\": \"LibFuzzer\",\n    \"author\": [],\n    \"year\": 2015,\n    \"toolurl\": \"http://llvm.org/docs/LibFuzzer.html\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"targets\": [\n      \"Lib\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Luo et al.\",\n    \"year\": 2021,\n    \"author\": [\n      \"Weisi Luo\",\n      \"Dong Chai\",\n      \"Xiaoyue Run\",\n      \"Jiang Wang\",\n      \"Chunrong Fang\",\n      \"Zhenyu Chen\"\n    ],\n    \"title\": \"Graph-based Fuzz Testing for Deep Learning Inference Engines\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"toolurl\": \"https://github.com/gbftdlie/Graph-based-fuzz-testing\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2008.05933.pdf\"\n    ],\n    \"references\": [\n      \"TensorFuzz\"\n    ],\n    \"targets\": [\n      \"DL inference engine\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"MALintent\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"android\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Ammar Askar\",\n      \"Fabian Fleischer\",\n      \"Christopher Kruegel\",\n      \"Giovanni Vigna\",\n      \"Taesoo Kim\"\n    ],\n    \"toolurl\": \"https://github.com/sslab-gatech/MALintent\",\n    \"title\": \"MALintent: Coverage Guided Intent Fuzzing Framework for Android\",\n    \"booktitle\": \"Network and Distributed System Security Symposium (NDSS) 2025\",\n    \"journal\": \"NDSS\",\n    \"miscurl\": [\n      \"https://dx.doi.org/10.14722/ndss.2025.230125\"\n    ],\n    \"keywords\": [\n      \"android\",\n      \"intent fuzzing\",\n      \"privacy violations\",\n      \"JNI\",\n      \"coverage-guided\"\n    ]\n  },\n  {\n    \"name\": \"MAU\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"EVM\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Weimin Chen\",\n      \"Xiapu Luo\",\n      \"Haipeng Cai\",\n      \"Haoyu Wang\"\n    ],\n    \"title\": \"Towards Smart Contract Fuzzing on GPU\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2024/313000a195/1WPcYmDLzKo\"\n    ]\n  },\n  {\n    \"name\": \"MC2\",\n    \"year\": \"2022\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Abhishek Shah\",\n      \"Dongdong She\",\n      \"Samanway Sadhu\",\n      \"Krish Singal\",\n      \"Peter Coffman\",\n      \"Suman Jana\"\n    ],\n    \"toolurl\": \"https://hub.docker.com/r/abhishekshah212/mc2\",\n    \"title\": \"MC2: Rigorous and Efficient Directed Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"references\": [\n      \"AFLGo\",\n      \"ParmeSan\"\n    ],\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2208.14530.pdf\"\n    ]\n  },\n  {\n    \"name\": \"MCFuzz\",\n    \"year\": 2019,\n    \"author\": [\n      \"Chengyu Zhang\",\n      \"Ting Su\",\n      \"Yichen Yan\",\n      \"Fuyuan Zhang\",\n      \"Geguang Pu\",\n      \"Zhendong Su\"\n    ],\n    \"title\": \"Finding and Understanding Bugs in Software Model Checkers\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://tingsu.github.io/files/fse19-MCFuzz.pdf\"\n    ],\n    \"targets\": [\n      \"Model checker\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"MDPERFFUZZ\",\n    \"year\": 2021,\n    \"author\": [\n      \"Penghui Li\",\n      \"Yinxi Liu\",\n      \"Wei Meng\"\n    ],\n    \"title\": \"Understanding and Detecting Performance Bugs in Markdown Compilers\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/cuhk-seclab/mdperffuzz\",\n    \"miscurl\": [\n      \"https://appsrv.cse.cuhk.edu.hk/~phli/paper/ase21_mdperffuzz.pdf\"\n    ],\n    \"targets\": [\n      \"Markdown\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"MINER\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"RESTler\"\n    ],\n    \"author\": [\n      \"Chenyang Lyu\",\n      \"Jiacheng Xu\",\n      \"Shouling Ji\",\n      \"Xuhong Zhang\",\n      \"Qinying Wang\",\n      \"Binbin Zhao\",\n      \"Gaoning Pan\",\n      \"Wei Cao\",\n      \"Peng Chen\",\n      \"Raheem Beyah\"\n    ],\n    \"toolurl\": \"https://github.com/puppet-meteor/MINER\",\n    \"title\": \"MINER: A Hybrid Data-Driven Approach for REST API Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec23fall-prepub-129-lyu.pdf\"\n    ]\n  },\n  {\n    \"name\": \"MLIRSmith\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Compiler\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"CSmith\"\n    ],\n    \"author\": [\n      \"Haoyu Wang\",\n      \"Junjie Chen\",\n      \"Chuyue Xie\",\n      \"Shuang Liu\",\n      \"Zan Wang\",\n      \"Qingchao Shen\",\n      \"Yingquan Zhao\"\n    ],\n    \"toolurl\": \"https://github.com/Colloportus0/MLIRSmith\",\n    \"title\": \"MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"keywords\": [\n      \"MLIR\"\n    ]\n  },\n  {\n    \"name\": \"MLIRTracer\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Compiler\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"MLIRSmith\"\n    ],\n    \"author\": [\n      \"Weiyuan Tong\",\n      \"Zixu Wang\",\n      \"Zhanyong Tang\",\n      \"Jianbin Fang\",\n      \"Yuqun Zhang\",\n      \"Guixin Ye\"\n    ],\n    \"title\": \"Directed Testing in MLIR: Unleashing Its Potential by Overcoming the Limitations of Random Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://doi.org/10.1145/3729372\"\n    ],\n    \"keywords\": [\n      \"Compiler Fuzzing\",\n      \"MLIR\"\n    ]\n  },\n  {\n    \"name\": \"MOCK\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"author\": [\n      \"Jiacheng Xu\",\n      \"Xuhong Zhang\",\n      \"Shouling Ji\",\n      \"Yuan Tian\",\n      \"Binbin Zhao\",\n      \"Qinying Wang\",\n      \"Peng Cheng\",\n      \"Jiming Chen\"\n    ],\n    \"toolurl\": \"https://github.com/m0ck1ng/mock\",\n    \"title\": \"MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2024-131-paper.pdf\"\n    ],\n    \"keywords\": [\n      \"Kernel Fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"MOPT\",\n    \"year\": 2019,\n    \"author\": [\n      \"Chenyang Lyu\",\n      \"Shouling Ji\",\n      \"Chao Zhang\",\n      \"Yuwei Li\",\n      \"Wei-Han Lee\",\n      \"Yu Song\",\n      \"Raheem Beyah\"\n    ],\n    \"title\": \"MOPT: Optimized Mutation Scheduling for Fuzzers\",\n    \"booktitle\": \"Proceedings of the USENIX Annual Technical Conference\",\n    \"toolurl\": \"https://github.com/puppet-meteor/MOpt-AFL\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec19-lyu.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"MPFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Blockchain\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Yibo Wang\",\n      \"Yuzhe Tang\",\n      \"Kai Li\",\n      \"Wanning Ding\"\n    ],\n    \"toolurl\": \"https://figshare.com/articles/software/MPFUZZ/26061169\",\n    \"title\": \"Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Fluffy\",\n      \"LOKI\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-wang-yibo.pdf\"\n    ]\n  },\n  {\n    \"name\": \"MTFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Dongdong She\",\n      \"Rahul Krishna\",\n      \"Lu Yan\",\n      \"Suman Jana\",\n      \"Baishakhi Ray\"\n    ],\n    \"title\": \"MTFuzz: Fuzzing with a Multi-task Neural Network\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"toolurl\": \"https://github.com/llvm/llvm-project/commit/e2e38fca64e49d684de0b100437fe2f227f8fcdd\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2005.12392.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"Neuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"MagicFuzzer\",\n    \"year\": 2012,\n    \"author\": [\n      \"Yan Cai\",\n      \"W.K. Chan\"\n    ],\n    \"title\": \"MagicFuzzer: Scalable Deadlock Detection for Large-Scale Applications\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"toolurl\": \"http://lcs.ios.ac.cn/~yancai/magicfuzzer/\",\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"references\": [\n      \"DeadlockFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Mahmood et al.\",\n    \"year\": 2012,\n    \"author\": [\n      \"Riyadh Mahmood\",\n      \"Naeem Esfahani\",\n      \"Thabet Kacem\",\n      \"Nariman Mirzaei\",\n      \"Sam Malek\",\n      \"Angelos Stavrou\"\n    ],\n    \"title\": \"A whitebox approach for automated security testing of android applications on the cloud\",\n    \"booktitle\": \"Proceedings of the International Workshop on Automation of Software Test\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/document/6228986\"\n    ],\n    \"references\": [\n      \"SAGE\"\n    ],\n    \"targets\": [\n      \"Lib\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Mallory\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Distributed System\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Ruijie Meng\",\n      \"George Pîrlea\",\n      \"Abhik Roychoudhury\",\n      \"Ilya Sergey\"\n    ],\n    \"toolurl\": \"https://github.com/dsfuzz/mallory\",\n    \"title\": \"Greybox Fuzzing of Distributed Systems\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3576915.3623097\"\n    ]\n  },\n  {\n    \"name\": \"Mamba\",\n    \"year\": 2012,\n    \"author\": [\n      \"Roger Lee Seagle Jr.\"\n    ],\n    \"title\": \"A Framework for File Format Fuzzing with Genetic Algorithms\",\n    \"toolurl\": \"https://github.com/rogwfu/mamba\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"EFS\",\n      \"Sulley\"\n    ],\n    \"miscurl\": [\n      \"http://trace.tennessee.edu/cgi/viewcontent.cgi?article=2402&context=utk_graddiss\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Matryoshka\",\n    \"year\": 2019,\n    \"author\": [\n      \"Peng Chen\",\n      \"Jianzhong Liu\",\n      \"Hao Chen\"\n    ],\n    \"title\": \"Matryoshka: Fuzzing Deeply Nested Branches\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://kms.shanghaitech.edu.cn/bitstream/2MSLDSTB/104875/1/10.1145%403319535.3363225.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"Angora\",\n      \"SLF\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Melkor\",\n    \"year\": 2014,\n    \"author\": [\n      \"Alejandro Hernández\"\n    ],\n    \"toolurl\": \"https://github.com/IOActive/Melkor_ELF_Fuzzer\",\n    \"miscurl\": [\n      \"https://ioactive.com/wp-content/uploads/2018/05/IOActive_ELF_Parsing_with_Melkor-1.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"MemLock\",\n    \"year\": 2020,\n    \"author\": [\n      \"Cheng Wen\",\n      \"Haijun Wang\",\n      \"Yuekang Li\",\n      \"Shengchao Qin\",\n      \"Yang Liu\",\n      \"Zhiwu Xu\",\n      \"Hongxu Chen\",\n      \"Xiaofei Xie\",\n      \"Geguang Pu\",\n      \"Ting Liu\"\n    ],\n    \"title\": \"MemLock: Memory Usage Guided Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"SlowFuzz\",\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"MendelFuzz\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Han Zheng\",\n      \"Flavio Toffalini\",\n      \"Marcel Böhme\",\n      \"Mathias Payer\"\n    ],\n    \"toolurl\": \"https://github.com/HexHive/MendelFuzz-Artifact\",\n    \"title\": \"MendelFuzz: The Return of the Deterministic Stage\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://doi.org/10.1145/3715713\"\n    ]\n  },\n  {\n    \"name\": \"Metamong\",\n    \"year\": 2023,\n    \"targets\": [\n      \"Web\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Suhwan Song\",\n      \"Byoungyoung Lee\"\n    ],\n    \"toolurl\": \"https://figshare.com/s/d3c228e614672f9aa811\",\n    \"title\": \"Metamong: Detecting Render-Update Bugs in Web Browsers through Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"references\": [\n      \"Domato\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3611643.3616336\"\n    ]\n  },\n  {\n    \"name\": \"Miller et al.\",\n    \"year\": 1990,\n    \"author\": [\n      \"Barton P. Miller\",\n      \"Louis Fredriksen\",\n      \"Bryan So\"\n    ],\n    \"title\": \"An Empirical Study of the Reliability of UNIX Utilities\",\n    \"journal\": \"Communications of the ACM\",\n    \"volume\": \"33\",\n    \"number\": \"12\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Minerva\",\n    \"year\": \"2022\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Chijin Zhou\",\n      \"Quan Zhang\",\n      \"Mingzhe Wang\",\n      \"Lihua Guo\",\n      \"Jie Liang\",\n      \"Zhe Liu\",\n      \"Mathias Payer\",\n      \"Yu Jiang\"\n    ],\n    \"toolurl\": \"https://github.com/ChijinZ/Minerva\",\n    \"title\": \"Minerva: Browser API Fuzzing with Dynamic Mod-Ref Analysis\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"references\": [\n      \"Domato\"\n    ],\n    \"miscurl\": [\n      \"https://nebelwelt.net/files/22FSE.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Minifuzz\",\n    \"year\": 2011,\n    \"author\": [\n      \"Jeremy Dallman\",\n      \"Georgeo Pulikkathara\"\n    ],\n    \"miscurl\": [\n      \"https://msdn.microsoft.com/en-us/biztalk/gg675011\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"MirageFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Mingyuan Wu\",\n      \"Kunqiu Chen\",\n      \"Qi Luo\",\n      \"Jiahong Xiang\",\n      \"Ji Qi\",\n      \"Junjie Chen\",\n      \"Heming Cui\",\n      \"Yuqun Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/WorldExecute/fuzzer\",\n    \"title\": \"Enhancing Coverage-Guided Fuzzing via Phantom Program\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://shadowmydx.github.io/papers/fse2023a.pdf\"\n    ]\n  },\n  {\n    \"name\": \"MoFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Hoang Lam Nguyen\",\n      \"Nebras Nassar\",\n      \"Timo Kehrer\",\n      \"Lars Grunske\"\n    ],\n    \"title\": \"MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/hub-se/MoFuzz\",\n    \"miscurl\": [\n      \"https://doi.org/10.18420/SE2021_29\",\n      \"https://github.com/rohanpadhye/jqf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"JQF\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"MoWF\",\n    \"year\": 2016,\n    \"author\": [\n      \"Van-Thuan Pham\",\n      \"Marcel Böhme\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"title\": \"Model-Based Whitebox Fuzzing for Program Binaries\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"https://thuanpv.github.io/publications/ASE16.pdf\",\n      \"https://thuanpv.github.io/publications/MoWF_ASE2016.pdf\"\n    ],\n    \"references\": [\n      \"Driller\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"MobFuzz\",\n    \"year\": 2022,\n    \"author\": [\n      \"Gen Zhang\",\n      \"Pengfei Wang\",\n      \"Tai Yue\",\n      \"Xiangdong Kong\",\n      \"Shan Huang\",\n      \"Xu Zhou\",\n      \"Kai Lu\"\n    ],\n    \"title\": \"MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2022-314-paper.pdf\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Moneta\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"author\": [\n      \"Joonkyo Jung\",\n      \"Jisoo Jang\",\n      \"Yongwan Jo\",\n      \"Jonas Vinck\",\n      \"Alexios Voulimeneas\",\n      \"Stijn Volckaert\",\n      \"Dokyung Song\"\n    ],\n    \"toolurl\": \"https://github.com/yonsei-sslab/moneta\",\n    \"title\": \"Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States\",\n    \"booktitle\": \"Network and Distributed System Security Symposium (NDSS) 2025\",\n    \"journal\": \"NDSS\",\n    \"miscurl\": [\n      \"https://dx.doi.org/10.14722/ndss.2025.230218\"\n    ],\n    \"keywords\": [\n      \"gpu\",\n      \"driver\"\n    ]\n  },\n  {\n    \"name\": \"Montage\",\n    \"year\": 2020,\n    \"author\": [\n      \"Suyoung Lee\",\n      \"HyungSeok Han\",\n      \"Sang Kil Cha\",\n      \"Sooel Son\"\n    ],\n    \"title\": \"Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20summer_lee-suyoung_prepub_0.pdf\"\n    ],\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"references\": [\n      \"CodeAlchemist\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"MorFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"DifuzzRTL\"\n    ],\n    \"author\": [\n      \"Jinyan Xu\",\n      \"Yiyuan Liu\",\n      \"Sirui He\",\n      \"Haoran Lin\",\n      \"Yajin Zhou\",\n      \"Cong Wang\"\n    ],\n    \"toolurl\": \"https://github.com/sycuricon/MorFuzz\",\n    \"title\": \"MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-xu-jinyan.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Morphuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Alexander Bulekov\",\n      \"Bandan Das\",\n      \"Stefan Hajnoczi\",\n      \"Manuel Egele\"\n    ],\n    \"toolurl\": \"https://doi.org/10.5281/zenodo.5664344\",\n    \"title\": \"Morphuzz: Bending (Input) Space to Fuzz Virtual Devices\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-bulekov.pdf\"\n    ]\n  },\n  {\n    \"name\": \"MultiFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Michael Chesser\",\n      \"Surya Nepal\",\n      \"Damith C. Ranasinghe\"\n    ],\n    \"toolurl\": \"https://github.com/MultiFuzz/MultiFuzz\",\n    \"title\": \"MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Fuzzware\",\n      \"Hoedur\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-chesser.pdf\"\n    ]\n  },\n  {\n    \"name\": \"MundoFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Cheolwoo Myung\",\n      \"Gwangmu Lee\",\n      \"Byoungyoung Lee\"\n    ],\n    \"title\": \"MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-myung.pdf\"\n    ]\n  },\n  {\n    \"name\": \"MutaGen\",\n    \"year\": 2015,\n    \"author\": [\n      \"Ulf Kargén\",\n      \"Nahid Shahmehri\"\n    ],\n    \"title\": \"Turning Programs Against Each Other: High Coverage Fuzz-testing Using Binary-code Mutation and Dynamic Slicing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://www.ida.liu.se/~ulfka17/papers/FSE2015.pdf\"\n    ],\n    \"references\": [\n      \"CSmith\",\n      \"TaintScope\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Muzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Hongxu Chen\",\n      \"Shengjian Guo\",\n      \"Yinxing Xue\",\n      \"Yulei Sui\",\n      \"Cen Zhang\",\n      \"Yuekang Li\",\n      \"Haijun Wang\",\n      \"Yang Liu\"\n    ],\n    \"title\": \"MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20-chen-hongxu.pdf\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"Razzer\"\n    ],\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"NAUTILUS\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"RESTler\"\n    ],\n    \"author\": [\n      \"Gelei Deng\",\n      \"Zhiyi Zhang\",\n      \"Yuekang Li\",\n      \"Yi Liu\",\n      \"Tianwei Zhang\",\n      \"Yang Liu\",\n      \"Guo Yu\",\n      \"Dongjin Wang\"\n    ],\n    \"toolurl\": \"https://sites.google.com/view/nautilus-testing\",\n    \"title\": \"Nautilus: Automated RESTful API Vulnerability Detection\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-deng-gelei.pdf\"\n    ]\n  },\n  {\n    \"name\": \"NEXZZER\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Hopper\"\n    ],\n    \"author\": [\n      \"Jiayi Lin\",\n      \"Qingyu Zhang\",\n      \"Junzhe Li\",\n      \"Chenxin Sun\",\n      \"Hao Zhou\",\n      \"Changhua Luo\",\n      \"Chenxiong Qian\"\n    ],\n    \"toolurl\": \"https://figshare.com/s/9539927ac84ee6a7ac14\",\n    \"title\": \"NEXZZER: Automatic Library Fuzzing through API Relation Evolvement\",\n    \"booktitle\": \"Network and Distributed System Security Symposium (NDSS) 2025\",\n    \"journal\": \"NDSS\",\n    \"miscurl\": [\n      \"https://dx.doi.org/10.14722/ndss.2025.240750\"\n    ],\n    \"keywords\": [\n      \"library fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"NTFuzz\",\n    \"year\": 2021,\n    \"author\": [\n      \"Jaeseung Choi\",\n      \"Kangsu Kim\",\n      \"Daejin Lee\",\n      \"Sang Kil Cha\"\n    ],\n    \"title\": \"NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://softsec.kaist.ac.kr/~jschoi/data/oakland2021.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"IMF\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"NablaFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Chenyuan Yang\",\n      \"Yinlin Deng\",\n      \"Jiayi Yao\",\n      \"Yuxing Tu\",\n      \"Hanchi Li\",\n      \"Lingming Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/ise-uiuc/NablaFuzz\",\n    \"title\": \"Fuzzing Automatic Differentiation in Deep-Learning Libraries\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"FreeFuzz\"\n    ],\n    \"miscurl\": [\n      \"https://yangchenyuan.github.io/files/ICSE23-NablaFuzz.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Narada\",\n    \"year\": 2015,\n    \"author\": [\n      \"Malavika Samak\",\n      \"Murali Krishna Ramanathan\",\n      \"Suresh Jagannathan\"\n    ],\n    \"title\": \"Synthesizing Racy Tests\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"references\": [\n      \"RaceFuzzer\"\n    ],\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"NaturalFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"DISC (Data-Intensive Scalable Computing) Systems\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"BigFuzz\"\n    ],\n    \"author\": [\n      \"Ahmad Humayun\",\n      \"Yaoxuan Wu\",\n      \"Miryung Kim\",\n      \"Muhammad Ali Gulzar\"\n    ],\n    \"toolurl\": \"https://github.com/SEED-VT/NaturalFuzz\",\n    \"title\": \"NaturalFuzz: Natural Input Generation for Big Data Analytics\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"https://rohan.padhye.org/files/bigfuzz-ase20.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Nautilus\",\n    \"year\": 2019,\n    \"author\": [\n      \"Cornelius Aschermann\",\n      \"Tommaso Frassetto\",\n      \"Thorsten Holz\",\n      \"Patrick Jauernig\",\n      \"Ahmad-Reza Sadeghi\",\n      \"Daniel Teuchert\"\n    ],\n    \"title\": \"Nautilus: Fishing for Deep Bugs with Grammars\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/nautilus-fuzz/nautilus\",\n    \"miscurl\": [\n      \"https://www.syssec.ruhr-uni-bochum.de/media/emma/veroeffentlichungen/2018/12/17/NDSS19-Nautilus.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Nduja\",\n    \"year\": 2012,\n    \"author\": [\n      \"Rosario Valotta\"\n    ],\n    \"title\": \"Taking Browsers Fuzzing To The Next (DOM) Level\",\n    \"booktitle\": \"Proceedings of the DeepSec\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"cross_fuzz\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"NestFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Peng Deng\",\n      \"Zhemin Yang\",\n      \"Lei Zhang\",\n      \"Guangliang Yang\",\n      \"Wenzheng Hong\",\n      \"Yuan Zhang\",\n      \"Min Yang\"\n    ],\n    \"toolurl\": \"https://github.com/fdu-sec/NestFuzz\",\n    \"title\": \"NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3576915.3623103\"\n    ]\n  },\n  {\n    \"name\": \"NeuralFuzzer\",\n    \"year\": 2016,\n    \"author\": [\n      \"CIFASIS\"\n    ],\n    \"toolurl\": \"https://github.com/CIFASIS/neural-fuzzer\",\n    \"references\": [\n      \"QuickFuzz\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Neutaint\",\n    \"year\": 2020,\n    \"author\": [\n      \"Dongdong She\",\n      \"Yizheng Chen\",\n      \"Abhishek Shah\",\n      \"Baishakhi Ray\",\n      \"Suman Jana\"\n    ],\n    \"title\": \"Neutaint: Efficient Dynamic Taint Analysis with Neural Networks\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.cs.columbia.edu/~ass/publication/neutaint/\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Neuzz\",\n    \"year\": 2019,\n    \"author\": [\n      \"Dongdong She\",\n      \"Kexin Pei\",\n      \"Dave Epstein\",\n      \"Junfeng Yang\",\n      \"Baishakhi Ray\",\n      \"Suman Jana\"\n    ],\n    \"title\": \"Neuzz: Efficient Fuzzing with Neural Program Smoothing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"toolurl\": \"https://github.com/Dongdongshe/neuzz\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"Learn&Fuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Neuzz++\",\n    \"year\": 2023,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Maria-Irina Nicolae\",\n      \"Max Eisele\",\n      \"Andreas Zeller\"\n    ],\n    \"toolurl\": \"https://github.com/boschresearch/neuzzplusplus\",\n    \"title\": \"Revisiting Neural Program Smoothing for Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"references\": [\n      \"Neuzz\",\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3611643.3616308\"\n    ]\n  },\n  {\n    \"name\": \"Nightmare\",\n    \"year\": 2014,\n    \"author\": [\n      \"Joxean Koret\"\n    ],\n    \"toolurl\": \"https://github.com/joxeankoret/nightmare\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"radamsa\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"NodeMedic-FINE\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"FAST\"\n    ],\n    \"author\": [\n      \"Darion Cassel\",\n      \"Nuno Sabino\",\n      \"Min-Chien Hsu\",\n      \"Ruben Martins\",\n      \"Limin Jia\"\n    ],\n    \"toolurl\": \"https://zenodo.org/records/14249091\",\n    \"title\": \"NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2025-1636-paper.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Nyx\",\n    \"year\": 2021,\n    \"author\": [\n      \"Sergej Schumilo\",\n      \"Cornelius Aschermann\",\n      \"Ali Abbasi\",\n      \"Simon Wörner\",\n      \"Thorsten Holz\"\n    ],\n    \"title\": \"NYX: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/RUB-SysSec/nyx\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec21summer_schumilo.pdf\"\n    ],\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"references\": [\n      \"HYPER-CUBE\",\n      \"kAFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"OGHARN\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Hopper\"\n    ],\n    \"author\": [\n      \"Gabriel Sherman\",\n      \"Stefan Nagy\"\n    ],\n    \"toolurl\": \"https://github.com/FuturesLab/OGHarn\",\n    \"title\": \"No Harness, No Problem: Oracle-guided Harnessing for Auto-generating C API Fuzzing Harnesses\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://users.cs.utah.edu/~snagy/papers/25ICSE-b.pdf\"\n    ],\n    \"keywords\": [\n      \"C API Fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"OddFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Sicong Cao\",\n      \"Biao He\",\n      \"Xiaobing Sun\",\n      \"Yu Ouyang\",\n      \"Chao Zhang\",\n      \"Xiaoxue Wu\",\n      \"Ting Su\",\n      \"Lili Bo\",\n      \"Bin Li\",\n      \"Chuanlei Ma\",\n      \"Jiajia Li\",\n      \"Tao Wei\"\n    ],\n    \"toolurl\": \"https://github.com/ODDFuzz/ODDFuzz\",\n    \"title\": \"ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2304.04233.pdf\"\n    ],\n    \"keywords\": [\n      \"Java\",\n      \"Deserialization\"\n    ]\n  },\n  {\n    \"name\": \"OptFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Jiming Wang\",\n      \"Yan Kang\",\n      \"Chenggang Wu\",\n      \"Yuhao Hu\",\n      \"Yue Sun\",\n      \"Jikai Ren\",\n      \"Yuanming Lai\",\n      \"Mengyao Xie\",\n      \"Charles Zhang\",\n      \"Tao Li\",\n      \"Zhe Wang\"\n    ],\n    \"toolurl\": \"https://github.com/JimWongM/OptFuzz\",\n    \"title\": \"OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"Fuzzilli\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-wang-jiming.pdf\"\n    ],\n    \"keywords\": [\n      \"JavaScript\",\n      \"JIT compiler\"\n    ]\n  },\n  {\n    \"name\": \"Optimuzz\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Compiler\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFLGo\",\n      \"Fuzzilli\"\n    ],\n    \"author\": [\n      \"Jaeseong Kwon\",\n      \"Bongjun Jang\",\n      \"Juneyoung Lee\",\n      \"Kihong Heo\"\n    ],\n    \"toolurl\": \"https://prosys.kaist.ac.kr/optimuzz\",\n    \"title\": \"Optimization-Directed Compiler Fuzzing for Continuous Translation Validation\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"miscurl\": [\n      \"https://doi.org/10.1145/3729275\"\n    ],\n    \"keywords\": [\n      \"compiler fuzzing\",\n      \"translation validation\"\n    ]\n  },\n  {\n    \"name\": \"PATA\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Jie Liang\",\n      \"Mingzhe Wang\",\n      \"Chijin Zhou\",\n      \"Zhiyong Wu\",\n      \"Yu Jiang\",\n      \"Jianzhong Liu\",\n      \"Zhe Liu\",\n      \"Jiaguang Sun\"\n    ],\n    \"toolurl\": \"https://github.com/PATA-FUZZ/pata\",\n    \"title\": \"PATA: Fuzzing with Path Aware Taint Analysis\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2022/131600a154/1wKCe9rJFfi\"\n    ]\n  },\n  {\n    \"name\": \"PBFDroid\",\n    \"year\": 2023,\n    \"targets\": [\n      \"UI\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Jingling Sun\",\n      \"Ting Su\",\n      \"Jiayi Jiang\",\n      \"Jue Wang\",\n      \"Geguang Pu\",\n      \"Zhendong Su\"\n    ],\n    \"toolurl\": \"https://github.com/property-based-fuzzing/home\",\n    \"title\": \"Property-Based Fuzzing for Finding Data Manipulation Errors in Android Apps\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"references\": [\n      \"JQF\",\n      \"APE\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3611643.3616286\"\n    ]\n  },\n  {\n    \"name\": \"PDGF\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Yujian Zhang\",\n      \"Yaokun Liu\",\n      \"Jinyu Xu\",\n      \"Yanhao Wang\"\n    ],\n    \"toolurl\": \"https://github.com/SEU-SSL/PDGF\",\n    \"title\": \"Predecessor-aware Directed Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2024/313000a040/1RjEaeMELbq\"\n    ]\n  },\n  {\n    \"name\": \"PGFUZZ\",\n    \"year\": 2021,\n    \"author\": [\n      \"Hyungsub Kim\",\n      \"Muslum Ozgur Ozmen\",\n      \"Antonio Bianchi\",\n      \"Z. Berkay Celik\",\n      \"Dongyan Xu\"\n    ],\n    \"title\": \"PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/purseclab/PGFUZZ\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/ndss2021_6A-1_24096_paper.pdf\"\n    ],\n    \"targets\": [\n      \"Robot Vehicle\"\n    ],\n    \"references\": [\n      \"RVFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"PROTOS\",\n    \"year\": 2001,\n    \"author\": [\n      \"Rauli Kaksonen\",\n      \"Marko Laakso\",\n      \"Ari Takanen\"\n    ],\n    \"title\": \"Software Security Assessment through Specification Mutations and Fault Injection\",\n    \"booktitle\": \"Proceedings of the IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"PULSAR\",\n    \"year\": 2015,\n    \"author\": [\n      \"Hugo Gascon\",\n      \"Christian Wressnegger\",\n      \"Fabian Yamaguchi\",\n      \"Daniel Arp\",\n      \"Konrad Rieck\"\n    ],\n    \"title\": \"PULSAR: Stateful Black-Box Fuzzing of Proprietary Network Protocols\",\n    \"booktitle\": \"Proceedings of the International Conference on Security and Privacy in Communication Systems\",\n    \"toolurl\": \"https://github.com/hgascon/pulsar\",\n    \"miscurl\": [\n      \"http://user.cs.uni-goettingen.de/~krieck/docs/2015-securecomm.pdf\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"references\": [\n      \"TFuzz\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Pangolin\",\n    \"year\": 2020,\n    \"author\": [\n      \"Heqing Huang\",\n      \"Peisen Yao\",\n      \"Rongxin Wu\",\n      \"Qingkai Shi\",\n      \"Charles Zhang\"\n    ],\n    \"title\": \"Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://qingkaishi.github.io/public_pdfs/SP2020.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"QSYM\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ParmeSan\",\n    \"year\": 2020,\n    \"author\": [\n      \"Sebastian Österlund\",\n      \"Kaveh Razavi\",\n      \"Herbert Bos\",\n      \"Cristiano Giuffrida\"\n    ],\n    \"title\": \"ParmeSan: Sanitizer-guided Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/vusec/parmesan\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20fall_osterlund_prepub.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFLGo\",\n      \"Angora\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"PartEmu\",\n    \"year\": \"2020\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Lee Harrison\",\n      \"Hayawardh Vijayakumar\",\n      \"Rohan Padhye\",\n      \"Koushik Sen\",\n      \"Michael Grace\"\n    ],\n    \"title\": \"PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"TriforceAFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20-harrison.pdf\"\n    ],\n    \"keywords\": [\n      \"TrustZone\",\n      \"TEE\"\n    ]\n  },\n  {\n    \"name\": \"Peach\",\n    \"year\": 2004,\n    \"author\": [\n      \"Michael Eddington\"\n    ],\n    \"toolurl\": \"https://www.peach.tech\",\n    \"targets\": [\n      \"File\",\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"PeriScope\",\n    \"year\": 2019,\n    \"title\": \"PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/securesystemslab/periscope\",\n    \"miscurl\": [\n      \"https://sites.cs.ucsb.edu/~cspensky/pdfs/ndss2019_04A-1_Song_paper.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"PhyFu\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Physics Simulation Engine (PSE)\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Dongwei Xiao\",\n      \"Zhibo Liu\",\n      \"Shuai Wang\"\n    ],\n    \"toolurl\": \"https://github.com/PhyFuzz/phyfu\",\n    \"title\": \"PHYFU: Fuzzing Modern Physics Simulation Engines\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2307.10818.pdf\"\n    ],\n    \"keywords\": [\n      \"PSE\"\n    ]\n  },\n  {\n    \"name\": \"PolyFuzz\",\n    \"year\": 2023,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Wen Li\",\n      \"Jinyang Ruan\",\n      \"Guangbei Yi\",\n      \"Long Cheng\",\n      \"Xiapu Luo\",\n      \"Haipeng Cai\"\n    ],\n    \"toolurl\": \"https://figshare.com/s/8ba4650e3248197fd756\",\n    \"title\": \"PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-li-wen.pdf\"\n    ]\n  },\n  {\n    \"name\": \"PolyGlot\",\n    \"year\": 2021,\n    \"author\": [\n      \"Yongheng Chen\",\n      \"Rui Zhong\",\n      \"Hong Hu\",\n      \"Hangfan Zhang\",\n      \"Yupeng Yang\",\n      \"Dinghao Wu\",\n      \"Wenke Lee\"\n    ],\n    \"title\": \"One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://faculty.ist.psu.edu/wu/papers/polyglot.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"toolurl\": \"https://github.com/s3team/Polyglot\",\n    \"references\": [\n      \"CSmith\",\n      \"Die\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"PreFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Mingyuan Wu\",\n      \"Ling Jiang\",\n      \"Jiahong Xiang\",\n      \"Yuqun Zhang\",\n      \"Guowei Yang\",\n      \"Huixin Ma\",\n      \"Sen Nie\",\n      \"Shi Wu\",\n      \"Heming Cui\",\n      \"Lingming Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/PoShaung/program-smoothing-fuzzing\",\n    \"title\": \"Evaluating and Improving Neural Program-Smoothing-based Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"Neuzz\",\n      \"MTFuzz\"\n    ],\n    \"miscurl\": [\n      \"http://zhangyuqun.com/publications/icse2022a.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Predictive Context-sensitive Fuzzing\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Angora\",\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Pietro Borrello\",\n      \"Andrea Fioraldi\",\n      \"Daniele Cono D’Elia\",\n      \"Davide Balzarotti\",\n      \"Leonardo Querzoni\",\n      \"Cristiano Giuffrida\"\n    ],\n    \"miscurl\": [\n      \"https://github.com/eurecom-s3/predictive-cs-fuzzing\"\n    ],\n    \"title\": \"Predictive Context-sensitive Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\"\n  },\n  {\n    \"name\": \"ProFuzzer\",\n    \"year\": 2019,\n    \"author\": [\n      \"Wei You\",\n      \"Xueqiang Wang\",\n      \"Shiqing Ma\",\n      \"Jianjun Huang\",\n      \"Xiangyu Zhang\",\n      \"XiaoFeng Wang\",\n      \"Bin Liang\"\n    ],\n    \"title\": \"ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://wcventure.github.io/FuzzingPaper/Paper/SP19_Profuzz.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"VUzzer\",\n      \"Angora\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"PromptFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Fuzz4All\"\n    ],\n    \"author\": [\n      \"Yunlong Lyu\",\n      \"Yuxuan Xie\",\n      \"Peng Chen\",\n      \"Hao Chen\"\n    ],\n    \"toolurl\": \"https://github.com/PromptFuzz/PromptFuzz\",\n    \"title\": \"Prompt Fuzzing for Fuzz Driver Generation\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2312.17677\"\n    ],\n    \"keywords\": [\n      \"LLM\",\n      \"fuzz driver\"\n    ]\n  },\n  {\n    \"name\": \"ProphetFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Argument\",\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"CarpetFuzz\"\n    ],\n    \"author\": [\n      \"Dawei Wang\",\n      \"Geng Zhou\",\n      \"Li Chen\",\n      \"Dan Li\",\n      \"Yukai Miao\"\n    ],\n    \"toolurl\": \"https://github.com/NASP-THU/ProphetFuzz\",\n    \"title\": \"ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\"\n  },\n  {\n    \"name\": \"Proteus\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Syed Md Mukit Rashid\",\n      \"Tianwei Wu\",\n      \"Kai Tu\",\n      \"Abdullah Al Ishtiaq\",\n      \"Ridwanul Hasan Tanvir\",\n      \"Yilu Dong\",\n      \"Omar Chowdhury\",\n      \"Syed Rafiul Hussain\"\n    ],\n    \"title\": \"State Machine Mutation-based Testing Framework for Wireless Communication Protocols\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3617232.3624849\"\n    ],\n    \"references\": [\n      \"LTEFuzz\"\n    ],\n    \"keywords\": [\n      \"stateful\",\n      \"LTE\",\n      \"bluetooth\"\n    ]\n  },\n  {\n    \"name\": \"PyRTFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Python\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"jsfunfuzz\"\n    ],\n    \"author\": [\n      \"Wen Li\",\n      \"Haoran Yang\",\n      \"Xiapu Luo\",\n      \"Long Cheng\",\n      \"Haipeng Cai\"\n    ],\n    \"toolurl\": \"https://github.com/awen-li/PyRTFuzz\",\n    \"title\": \"PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3576915.3623166\"\n    ]\n  },\n  {\n    \"name\": \"QSYM\",\n    \"year\": 2018,\n    \"author\": [\n      \"Insu Yun\",\n      \"Sangho Lee\",\n      \"Meng Xu\",\n      \"Yeongjin Jang\",\n      \"Taesoo Kim\"\n    ],\n    \"title\": \"QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/sslab-gatech/qsym\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-yun.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"Driller\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"QuickFuzz\",\n    \"year\": 2016,\n    \"author\": [\n      \"Gustavo Grieco\",\n      \"Martın Ceresa\",\n      \"Pablo Buiras\"\n    ],\n    \"title\": \"QuickFuzz: An Automatic Random Fuzzer for Common File Formats\",\n    \"booktitle\": \"Proceedings of the 9th International Symposium on Haskell\",\n    \"toolurl\": \"https://github.com/CIFASIS/QuickFuzz\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"honggfuzz\",\n      \"radamsa\"\n    ],\n    \"miscurl\": [\n      \"https://people.kth.se/~buiras/publications/QFHaskell2016.pdf\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"RANsacked\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"LTE\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"LTEFuzz\"\n    ],\n    \"author\": [\n      \"Nathaniel Bennett\",\n      \"Weidong Zhu\",\n      \"Benjamin Simon\",\n      \"Ryon Kennedy\",\n      \"William Enck\",\n      \"Patrick Traynor\",\n      \"Kevn R. B. Butler\"\n    ],\n    \"toolurl\": \"https://github.com/FICS/asnfuzzgen\",\n    \"title\": \"RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://nathanielbennett.com/publications/ransacked.pdf\"\n    ],\n    \"keywords\": [\n      \"cellular\"\n    ]\n  },\n  {\n    \"name\": \"RESTler\",\n    \"year\": 2019,\n    \"author\": [\n      \"Vaggelis Atlidakis\",\n      \"Patrice Godefroid\",\n      \"Marina Polishchuk\"\n    ],\n    \"title\": \"RESTler: Stateful REST API Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://patricegodefroid.github.io/public_psfiles/icse2019.pdf\"\n    ],\n    \"targets\": [\n      \"API\"\n    ],\n    \"references\": [\n      \"boofuzz\",\n      \"Sulley\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"RIoTFuzzer\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"DIANE\"\n    ],\n    \"author\": [\n      \"Kaizheng Liu\",\n      \"Ming Yang\",\n      \"Zhen Ling\",\n      \"Yue Zhang\",\n      \"Chongqing Lei\",\n      \"Junzhou Luo\",\n      \"Xinwen Fu\"\n    ],\n    \"toolurl\": \"https://github.com/kzLiu2017/RIoTFuzzer\",\n    \"title\": \"RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://cse.seu.edu.cn/_upload/article/files/4e/cb/457914eb4249b778299c9d33acdd/2b22fda2-e00c-441a-b7a6-e61c0d12de57.pdf\"\n    ]\n  },\n  {\n    \"name\": \"RLF\",\n    \"year\": 2022,\n    \"author\": [\n      \"Jianzhong Su\",\n      \"Hong-Ning Dai\",\n      \"Lingjun Zhao\",\n      \"Zibin Zheng\",\n      \"Xiapu Luo\"\n    ],\n    \"title\": \"Effectively Generating Vunlerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3551349.3560429\"\n    ],\n    \"targets\": [\n      \"EVM\"\n    ],\n    \"references\": [\n      \"ILF\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ROSA\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Dimitri Kokkonis\",\n      \"Michaël Marcozzi\",\n      \"Emilien Decoux\",\n      \"Stefano Zacchiroli\"\n    ],\n    \"toolurl\": \"https://github.com/binsec/rosa \",\n    \"title\": \"ROSA: Finding Backdoors with Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/abs/2505.08544 \"\n    ],\n    \"keywords\": [\n      \"metamorphic testing\",\n      \"backdoor detection\"\n    ]\n  },\n  {\n    \"name\": \"RPG\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"SyRust\"\n    ],\n    \"author\": [\n      \"Zhiwu Xu\",\n      \"Bohao Wu\",\n      \"Cheng Wen\",\n      \"Bin Zhang\",\n      \"Shengchao Qin\",\n      \"Mengda He\"\n    ],\n    \"toolurl\": \"https://zenodo.org/records/8202159\",\n    \"title\": \"RPG: Rust Library Fuzzing with Pool-based Fuzz Target Generation and Generic Support\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://wcventure.github.io/pdf/ICSE2024_RPG.pdf\"\n    ],\n    \"keywords\": [\n      \"Rust\"\n    ]\n  },\n  {\n    \"name\": \"RSFuzzer\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Jiawei Yin\",\n      \"Menghao Li\",\n      \"Yuekang Li\",\n      \"Yong Yu\",\n      \"Boru Lin\",\n      \"Yanyan zou\",\n      \"Yang Liu\",\n      \"Wei Huo\",\n      \"Jingling Xue\"\n    ],\n    \"title\": \"RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"SyzGen\"\n    ],\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2023/933600b765/1Js0Ek1SE6c\"\n    ],\n    \"keywords\": [\n      \"Hybrid fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"RVFuzzer\",\n    \"year\": 2019,\n    \"author\": [\n      \"Taegyu Kim\",\n      \"Chung Hwan Kim\",\n      \"Junghwan Rhee\",\n      \"Fan Fei\",\n      \"Zhan Tu\",\n      \"Gregory Walkup\",\n      \"Xiangyu Zhang\",\n      \"Xinyan Deng\",\n      \"Dongyan Xu\"\n    ],\n    \"title\": \"RVFUZZER: Finding Input Validation Bugs in Robotic Vehicles Through Control-Guided Testing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec19-kim.pdf\"\n    ],\n    \"targets\": [\n      \"Robot Vehicle\"\n    ],\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"RaceFuzzer\",\n    \"year\": 2008,\n    \"author\": [\n      \"Koushik Sen\"\n    ],\n    \"title\": \"Race Directed Random Testing of Concurrent Programs\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"toolurl\": \"https://github.com/ksen007/calfuzzer\",\n    \"targets\": [\n      \"Concurrency\"\n    ],\n    \"references\": [\n      \"CalFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Razzer\",\n    \"year\": 2019,\n    \"author\": [\n      \"Dae R. Jeong\",\n      \"Kyungtae Kim\",\n      \"Basavesh Shivakumar\",\n      \"Byoungyoung Lee\",\n      \"Insik Shin\"\n    ],\n    \"title\": \"Razzer: Finding Kernel Race Bugs through Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"toolurl\": \"https://github.com/compsec-snu/razzer\",\n    \"miscurl\": [\n      \"https://lifeasageek.github.io/papers/jeong-razzer.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"syzkaller\",\n      \"RaceFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ReUSB\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Jisoo Jang\",\n      \"Minsuk Kang\",\n      \"Dokyung Song\"\n    ],\n    \"title\": \"ReUSB: Replay-Guided USB Driver Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-jang.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Redqueen\",\n    \"year\": 2019,\n    \"author\": [\n      \"Cornelius Aschermann\",\n      \"Sergej Schumilo\",\n      \"Tim Blazytko\",\n      \"Robert Gawlik\",\n      \"Thorsten Holz\"\n    ],\n    \"title\": \"Redqueen: Fuzzing with Input-to-State Correspondence\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/RUB-SysSec/redqueen\",\n    \"miscurl\": [\n      \"https://www.ei.ruhr-uni-bochum.de/media/emma/veroeffentlichungen/2018/12/17/NDSS19-Redqueen.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"kAFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ResolverFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Qifan Zhang\",\n      \"Xuesong Bai\",\n      \"Xiang Li\",\n      \"Haixin Duan\",\n      \"Qi Li\",\n      \"Zhou Li\"\n    ],\n    \"toolurl\": \"https://github.com/ResolverFuzz/ResolverFuzz\",\n    \"title\": \"ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-zhang-qifan.pdf\"\n    ]\n  },\n  {\n    \"name\": \"RestTestGen\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Davide Corradini\",\n      \"Michele Pasqua\",\n      \"Mariano Ceccato\"\n    ],\n    \"toolurl\": \"https://github.com/SeUniVr/RestTestGen\",\n    \"title\": \"Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"RESTler\"\n    ],\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2301.01261.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Ruiter et al.\",\n    \"year\": 2015,\n    \"author\": [\n      \"Joeri de Ruiter\",\n      \"Erik Poll\"\n    ],\n    \"title\": \"Protocol State Fuzzing of TLS Implementations\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/jderuiter/statelearner\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-de-ruiter.pdf\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"RustSmith\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Compiler\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"CSmith\"\n    ],\n    \"author\": [\n      \"Mayank Sharma\",\n      \"Pingshi Yu\",\n      \"Alastair F. Donaldson\"\n    ],\n    \"toolurl\": \"https://github.com/rustsmith/rustsmith\",\n    \"title\": \"RustSmith: Random Differential Compiler Testing for Rust\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/10.1145/3597926.3604919\"\n    ]\n  },\n  {\n    \"name\": \"SAGE\",\n    \"year\": 2008,\n    \"author\": [\n      \"Patrice Godefroid\",\n      \"Michael Y. Levin\",\n      \"David A. Molnar\"\n    ],\n    \"title\": \"Automated Whitebox Fuzz Testing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"SDFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Penghui Li\",\n      \"Wei Meng\"\n    ],\n    \"title\": \"SDFuzz: Target States Driven Directed Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-li-penghui.pdf\"\n    ]\n  },\n  {\n    \"name\": \"SFuzz\",\n    \"year\": \"2022\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"whitebox\",\n    \"author\": [\n      \"Libo Chen\",\n      \"Quanpu Cai\",\n      \"Zhenbang Ma\",\n      \"Yanhao Wang\",\n      \"Hong Hu\",\n      \"Minghang Shen\",\n      \"Yue Liu\",\n      \"Shanqing Guo\",\n      \"Haixin Duan\"\n    ],\n    \"toolurl\": \"https://github.com/NSSL-SJTU/SFuzz\",\n    \"title\": \"SFuzz: Slice-based Fuzzing for Real-Time Operating Systems\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"references\": [\n      \"AFL\",\n      \"Driller\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3548606.3559367\"\n    ],\n    \"keywords\": [\n      \"RTOS\",\n      \"Slice-based Fuzzing\",\n      \"Taint analysis\",\n      \"Concolic execution\"\n    ]\n  },\n  {\n    \"name\": \"SGFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Jinsheng Ba\",\n      \"Marcel Bohme\",\n      \"Zahra Mizamomen\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"toolurl\": \"https://github.com/bajinsheng/SGFuzz\",\n    \"title\": \"Stateful Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-ba.pdf\"\n    ]\n  },\n  {\n    \"name\": \"SGXFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Tobias Cloosters\",\n      \"Johannes Willbold\",\n      \"Thorsten Holz\",\n      \"Lucas Davi\"\n    ],\n    \"title\": \"SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"kAFL\",\n      \"Nyx\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-cloosters.pdf\"\n    ]\n  },\n  {\n    \"name\": \"SHAPFUZZ\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"GreyOne\"\n    ],\n    \"author\": [\n      \"Kunpeng Zhang\",\n      \"Xiaogang Zhu\",\n      \"Xi Xiao\",\n      \"Minhui Xue\",\n      \"Chao Zhang\",\n      \"Sheng Wen\"\n    ],\n    \"toolurl\": \"https://github.com/ShapFuzz/ShapFuzz\",\n    \"title\": \"SHAPFUZZ: Efficient Fuzzing via Shapley-Guided Byte Selection\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2024-134-paper.pdf\"\n    ],\n    \"keywords\": [\n      \"Mutation-based fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"SHiFT\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"UAFL\"\n    ],\n    \"author\": [\n      \"Alejandro Mera\",\n      \"Changming Liu\",\n      \"Ruimin Sun\",\n      \"Engin Kirda\",\n      \"Long Lu\"\n    ],\n    \"toolurl\": \"https://github.com/RiS3-Lab/SHiFT\",\n    \"title\": \"SHiFT: Semi-hosted Fuzz Testing for Embedded Applications\",\n    \"booktitle\": \"Proceedings of the 33rd USENIX Security Symposium\",\n    \"journal\": \"USENIX Security\",\n    \"miscurl\": [\n      \"https://www.usenix.org/conference/usenixsecurity24/presentation/mera\"\n    ],\n    \"keywords\": [\n      \"microcontroller\"\n    ]\n  },\n  {\n    \"name\": \"SJFuzz\",\n    \"year\": 2023,\n    \"targets\": [\n      \"JVM\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Mingyuan Wu\",\n      \"Yicheng Ouyang\",\n      \"Minghai Lu\",\n      \"Junjie Chen\",\n      \"Yingquan Zhao\",\n      \"Heming Cui\",\n      \"Guowei Yang\",\n      \"Yuqun Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/fuzzy000/SJFuzz\",\n    \"title\": \"SJFuzz: Seed and Mutator Scheduling for JVM Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"references\": [\n      \"classming\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3611643.3616277\"\n    ]\n  },\n  {\n    \"name\": \"SLF\",\n    \"year\": 2019,\n    \"author\": [\n      \"Wei You\",\n      \"Xuwei Liu\",\n      \"Shiqing Ma\",\n      \"David Perry\",\n      \"Ziangyu Zhang\",\n      \"Bin Liang\"\n    ],\n    \"title\": \"SLF: Fuzzing without Valid Seed Inputs\",\n    \"booktitle\": \"Proceedings of the International Conference on Information Security\",\n    \"miscurl\": [\n      \"https://www.cs.rutgers.edu/~sm2283/papers/ICSE19.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"SMARTIAN\",\n    \"year\": 2021,\n    \"author\": [\n      \"Jaeseung Choi\",\n      \"Doyeon Kim\",\n      \"Soomin Kim\",\n      \"Gustavo Grieco\",\n      \"Alex Groce\",\n      \"Sang Kil Cha\"\n    ],\n    \"title\": \"SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"toolurl\": \"https://github.com/SoftSec-KAIST/Smartian\",\n    \"miscurl\": [\n      \"https://softsec.kaist.ac.kr/~jschoi/data/ase2021.pdf\"\n    ],\n    \"targets\": [\n      \"Smart Contract\"\n    ],\n    \"references\": [\n      \"Eclipser\",\n      \"ContractFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"SNOOZE\",\n    \"year\": 2006,\n    \"author\": [\n      \"Greg Banks\",\n      \"Marco Cova\",\n      \"Viktoria Felmetsger\",\n      \"Kevin Almeroth\",\n      \"Richard Kemmerer\",\n      \"Giovanni Vigna\"\n    ],\n    \"title\": \"SNOOZE: Toward a Stateful Network Protocol Fuzzer\",\n    \"booktitle\": \"Proceedings of the International Conference on Information Security\",\n    \"references\": [\n      \"PROTOS\",\n      \"SPIKE\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"SPIKE\",\n    \"year\": 2001,\n    \"author\": [\n      \"Dave Aitel\"\n    ],\n    \"title\": \"An Introduction to SPIKE, the Fuzzer Creation Kit\",\n    \"booktitle\": \"Proceedings of the Black Hat USA\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"SPIKEfile\",\n    \"year\": 2005,\n    \"author\": [\n      \"Michael Sutton\",\n      \"Adam Greene\"\n    ],\n    \"title\": \"The Art of File Format Fuzzing\",\n    \"booktitle\": \"Proceedings of the Black Hat Asia\",\n    \"toolurl\": \"https://packetstormsecurity.com/files/download/39625/SPIKEfile.tgz\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"SPIKE\",\n      \"FileFuzz\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"SSRFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Web\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"TEFuzz\",\n      \"Witcher\"\n    ],\n    \"author\": [\n      \"Enze Wang\",\n      \"Jianjun Chen\",\n      \"Wei Xie\",\n      \"Chuhan Wang\",\n      \"Yifei Gao\",\n      \"Zhenhua Wang\",\n      \"Haixin Duan\",\n      \"Yang Liu\",\n      \"Baosheng Wang\"\n    ],\n    \"toolurl\": \"https://github.com/SSRFuzz/SSRFuzz\",\n    \"title\": \"Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.jianjunchen.com/p/ssrfuzz.sp24.pdf\"\n    ]\n  },\n  {\n    \"name\": \"STORM\",\n    \"year\": 2020,\n    \"author\": [\n      \"Muhammad Numair Mansur\",\n      \"Maria Christakis\",\n      \"Valentin Wüstholz\",\n      \"Fuyuan Zhang\"\n    ],\n    \"title\": \"Detecting Critical Bugs in SMT Solvers Using Blackbox Mutational Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2004.05934.pdf\"\n    ],\n    \"targets\": [\n      \"SMT\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"SafireFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"LibAFL\"\n    ],\n    \"author\": [\n      \"Lukas Seidel\",\n      \"Dominik Maier\",\n      \"Marius Muench\"\n    ],\n    \"toolurl\": \"https://github.com/pr0me/SAFIREFUZZ\",\n    \"title\": \"Forming Faster Firmware Fuzzers\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-seidel.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Saturn\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"author\": [\n      \"Yiru Xu\",\n      \"Hao Sun\",\n      \"Jianzhong Liu\",\n      \"Yuheng Shen\",\n      \"Yu Jiang\"\n    ],\n    \"title\": \"SATURN: Host-Gadget Synergistic USB Driver Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"http://www.wingtecher.com/themes/WingTecherResearch/assets/papers/SATURN_SP24.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Savior\",\n    \"year\": 2020,\n    \"author\": [\n      \"Yaohui Chen\",\n      \"Peng Li\",\n      \"Jun Xu\",\n      \"Shengjian Guo\",\n      \"Rundong Zhou\",\n      \"Yulong Zhang\",\n      \"Tao Wei\",\n      \"Long Lu\"\n    ],\n    \"title\": \"Savior: Towards Bug-Driven Hybrid Testing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/document/9152682\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"KLEE\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"SeamFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Myungho Lee\",\n      \"Sooyoung Cha\",\n      \"Hakjoo Oh\"\n    ],\n    \"toolurl\": \"https://github.com/kupl/SeamFuzz-Artifact\",\n    \"title\": \"Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"AFL\",\n      \"AFL++\"\n    ],\n    \"miscurl\": [\n      \"http://prl.korea.ac.kr/~pronto/home/papers/icse23-seamfuzz.pdf\"\n    ],\n    \"keywords\": [\n      \"mutation strategy\",\n      \"fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"SegFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Dae R. Jeong\",\n      \"Byoungyoung Lee\",\n      \"Insik Shin\",\n      \"Youngjin Kwon\"\n    ],\n    \"toolurl\": \"https://github.com/casys-kaist/segfuzz\",\n    \"title\": \"SEGFUZZ: Segmenting Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"syzkaller\",\n      \"Krace\"\n    ],\n    \"miscurl\": [\n      \"http://cps.kaist.ac.kr/papers/jeong-segfuzz.pdf\"\n    ],\n    \"keywords\": [\n      \"Kernel fuzzing\",\n      \"concurrency bugs\"\n    ]\n  },\n  {\n    \"name\": \"SelectFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Changhua Luo\",\n      \"Wei Meng\",\n      \"Penghui Li\"\n    ],\n    \"title\": \"SelectFuzz: Efficient Directed Fuzzing with Selective Path Exploration\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"AFLGo\",\n      \"BEACON\"\n    ],\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2023/933600b050/1Js0DBwgpwY\"\n    ],\n    \"keywords\": [\n      \"Directed fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"Sensei\",\n    \"year\": 2020,\n    \"author\": [\n      \"Xiang Gao\",\n      \"Ripon K. Saha\",\n      \"Mukul R. Prasad\",\n      \"Abhik Roychoudhury\"\n    ],\n    \"title\": \"Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural Networks\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"AI\"\n    ],\n    \"miscurl\": [\n      \"https://www.comp.nus.edu.sg/~abhik/pdf/ICSE20_Sensei.pdf\"\n    ],\n    \"references\": [\n      \"TensorFuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Sharefuzz\",\n    \"year\": 2001,\n    \"author\": [\n      \"Dave Aitel\"\n    ],\n    \"toolurl\": \"https://sourceforge.net/projects/sharefuzz/\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Sidewinder\",\n    \"year\": 2006,\n    \"author\": [\n      \"Shawn Embleton\",\n      \"Sherri Sparks\",\n      \"Ryan Cunningham\"\n    ],\n    \"title\": \"Sidewinder: An Evolutionary Guidance System For Malicious Input Crafting\",\n    \"booktitle\": \"Proceedings of the Black Hat USA\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"miscurl\": [\n      \"https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Embleton.pdf\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Skyfire\",\n    \"year\": 2017,\n    \"author\": [\n      \"Junjie Wang\",\n      \"Bihuan Chen\",\n      \"Lei Wei\",\n      \"Yang Liu\"\n    ],\n    \"title\": \"Skyfire: Data-Driven Seed Generation for Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/abstract/document/7958599\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"SlowFuzz\",\n    \"year\": 2017,\n    \"author\": [\n      \"Theofilos Petsios\",\n      \"Jason Zhao\",\n      \"Angelos D. Keromytis\",\n      \"Suman Jana\"\n    ],\n    \"title\": \"SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/10.1145/3133956.3134073\"\n    ],\n    \"toolurl\": \"https://github.com/nettrino/slowfuzz\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"SmartFuzz\",\n    \"year\": 2009,\n    \"author\": [\n      \"David Molnar\",\n      \"Xue Cong Li\",\n      \"David A. Wagner\"\n    ],\n    \"title\": \"Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"SAGE\"\n    ],\n    \"toolurl\": \"https://github.com/dmolnar/SmartFuzz\",\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"Snipuzz\",\n    \"year\": 2021,\n    \"author\": [\n      \"Xiaotao Feng\",\n      \"Ruoxi Sun\",\n      \"Xiaogang Zhu\",\n      \"Minhui Xue\",\n      \"Sheng Wen\",\n      \"Dongxi Liu\",\n      \"Surya Nepal\",\n      \"Yang Xiang\"\n    ],\n    \"title\": \"Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://github.com/XtEsco/Snipuzz\",\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"SoFi\",\n    \"year\": 2021,\n    \"author\": [\n      \"Xiaoyu He\",\n      \"Xiaofei Xie\",\n      \"Yuekang Li\",\n      \"Jianwen Sun\",\n      \"Feng Li\",\n      \"Wei Zou\",\n      \"Yang Liu\",\n      \"Lei Yu\",\n      \"Jianhua Zhou \",\n      \"Wenchang Shi\",\n      \"Wei Huo\"\n    ],\n    \"title\": \"SoFi: Reflection-Augmented Fuzzing for JavaScript Engines\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://sites.google.com/view/sofi4js\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3460120.3484823\"\n    ],\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"references\": [\n      \"Superion\",\n      \"CodeAlchemist\",\n      \"Die\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"SpecBCFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"LTL Solver\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"STORM\"\n    ],\n    \"author\": [\n      \"Luiz Carvalho\",\n      \"Renzo Degiovanni\",\n      \"Maxime Cordy\",\n      \"Nazareno Aguirre\",\n      \"Yves Le Traon\",\n      \"Mike Papadakis\"\n    ],\n    \"toolurl\": \"https://github.com/SpecBCFuzz/repo\",\n    \"title\": \"SpecBCFuzz: Fuzzing LTL Solvers with Boundary Conditions\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/10.1145/3597503.3639087\"\n    ]\n  },\n  {\n    \"name\": \"SpecDoctor\",\n    \"year\": \"2022\",\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Jaewon Hur\",\n      \"Suhwan Song\",\n      \"Sunwoo Kim\",\n      \"Byoungyoung Lee\"\n    ],\n    \"title\": \"SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"references\": [\n      \"DifuzzRTL\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3548606.3560578\"\n    ],\n    \"keywords\": [\n      \"transient-execution vulnerability\",\n      \"fuzzing\",\n      \"differential testing\"\n    ]\n  },\n  {\n    \"name\": \"SpecFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Oleksii Oleksenko\",\n      \"Bohdan Trach\",\n      \"Mark Silberstein\",\n      \"Christof Fetzer\"\n    ],\n    \"title\": \"SpecFuzz: Bringing Spectre-type vulnerabilities to the surface\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/tudinfse/SpecFuzz\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20-oleksenko.pdf\"\n    ],\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Squirrel\",\n    \"year\": 2020,\n    \"author\": [\n      \"Rui Zhong\",\n      \"Yongheng Chen\",\n      \"Hong Hu\",\n      \"Hangfan Zhang\",\n      \"Wenke Lee\",\n      \"Dinghao Wu\"\n    ],\n    \"title\": \"Squirrel: Testing Database Management Systems withLanguage Validity and Coverage Feedback\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://github.com/s3team/Squirrel\",\n    \"miscurl\": [\n      \"https://huhong789.github.io/papers/squirrel.pdf\"\n    ],\n    \"targets\": [\n      \"DBMS\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"StateFuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Bodong Zhao\",\n      \"Zheming Li\",\n      \"Shisong Qin\",\n      \"Zheyu Ma\",\n      \"Ming Yuan\",\n      \"Wenyu Zhu\",\n      \"Zhihong Tian\",\n      \"Chao Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/vul337/StateFuzz\",\n    \"title\": \"StateFuzz: System Call-Based State-Aware Linux Dirver Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"DIFUZE\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-zhao-bodong.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Steelix\",\n    \"year\": 2017,\n    \"author\": [\n      \"Yuekang Li\",\n      \"Bihuan Chen\",\n      \"Mahinthan Chandramohan\",\n      \"Shang-Wei Lin\",\n      \"Yang Liu\",\n      \"Alwen Tiu\"\n    ],\n    \"title\": \"Steelix: Program-state Based Binary Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Symposium on Foundations of Software Engineering\",\n    \"miscurl\": [\n      \"https://dl.acm.org/citation.cfm?id=3106295\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"StochFuzz\",\n    \"year\": 2021,\n    \"author\": [\n      \"Zhuo Zhang\",\n      \"Wei You\",\n      \"Guanhong Tao\",\n      \"Yousra Aafer\",\n      \"Xuwei Liu\",\n      \"Xiangyu Zhang\"\n    ],\n    \"title\": \"Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/1t0x9N9Xy0w/pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"toolurl\": \"https://github.com/ZhangZhuoSJTU/StochFuzz\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Sulley\",\n    \"year\": 2007,\n    \"author\": [\n      \"Pedram Amini\",\n      \"Aaron Portnoy\",\n      \"Ryan Sears\"\n    ],\n    \"toolurl\": \"https://github.com/OpenRCE/sulley/\",\n    \"targets\": [\n      \"File\",\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Superion\",\n    \"year\": 2019,\n    \"author\": [\n      \"Junjie Wang\",\n      \"Bihuan Chen\",\n      \"Lei Wei\",\n      \"Yang Liu\"\n    ],\n    \"title\": \"Superion: Grammar-Aware Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/1812.01197.pdf\"\n    ],\n    \"targets\": [\n      \"JavaScript\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"LangFuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"SyRust\",\n    \"year\": 2021,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Yoshiki Takashima\",\n      \"Ruben Martins\",\n      \"Limin Jia\",\n      \"Corina S. Păsăreanu\"\n    ],\n    \"toolurl\": \"https://kilthub.cmu.edu/articles/software/SyRust_Artifact_PLDI2021_Artifact/14356976\",\n    \"title\": \"SyRust: Automatic Testing of Rust Libraries with Semantic-Aware Program Synthesis\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"miscurl\": [\n      \"https://doi.org/10.1184/R1/14356949\"\n    ],\n    \"references\": [\n      \"RESTler\"\n    ],\n    \"keywords\": [\n      \"Rust\"\n    ]\n  },\n  {\n    \"name\": \"SymCC\",\n    \"year\": 2020,\n    \"author\": [\n      \"Sebastian Poeplau\",\n      \"Aurélien Francillon\"\n    ],\n    \"title\": \"Symbolic execution with SYMCC: Don't interpret, compile!\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"http://www.s3.eurecom.fr/tools/symbolic_execution/symcc.html\",\n    \"miscurl\": [\n      \"http://www.s3.eurecom.fr/docs/usenixsec20_symcc.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"KLEE\",\n      \"QSYM\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"SymFuzz\",\n    \"year\": 2015,\n    \"author\": [\n      \"Sang Kil Cha\",\n      \"Maverick Woo\",\n      \"David Brumley\"\n    ],\n    \"title\": \"Program-Adaptive Mutational Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"toolurl\": \"http://security.ece.cmu.edu/symfuzz/\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"BFF\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"SynthFuzz\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Compiler\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"MLIRSmith\"\n    ],\n    \"author\": [\n      \"Ben Limpanukorn\",\n      \"Jiyuan Wang\",\n      \"Hong Jin Kang\",\n      \"Zitong Zhou\",\n      \"Miryung Kim\"\n    ],\n    \"toolurl\": \"https://github.com/UCLA-SEAL/SynthFuzz\",\n    \"title\": \"Fuzzing MLIR Compilers with Custom Mutation Synthesis\",\n    \"booktitle\": \"Proceedings of the 46th IEEE/ACM International Conference on Software Engineering (ICSE)\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/document/11029786\"\n    ],\n    \"keywords\": [\n      \"mutation synthesis\"\n    ]\n  },\n  {\n    \"name\": \"SyzDirect\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\",\n      \"AFLGo\"\n    ],\n    \"author\": [\n      \"Xin Tan\",\n      \"Yuan Zhang\",\n      \"Jiadong Lu\",\n      \"Xin Xiong\",\n      \"Zhuang Liu\",\n      \"Min Yang\"\n    ],\n    \"toolurl\": \"https://github.com/seclab-fudan/SyzDirect\",\n    \"title\": \"SyzDirect: Directed Greybox Fuzzing for Linux Kernel\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3576915.3623146\"\n    ]\n  },\n  {\n    \"name\": \"SyzGPT\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"author\": [\n      \"Zhiyu Zhang\",\n      \"Longxing Li\",\n      \"Ruigang Liang\",\n      \"Kai Chen\"\n    ],\n    \"toolurl\": \"https://github.com/QGrain/SyzGPT\",\n    \"title\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://doi.org/10.1145/3728913\"\n    ]\n  },\n  {\n    \"name\": \"SyzGen\",\n    \"year\": \"2021\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Weiteng Chen\",\n      \"Yu Wang\",\n      \"Zheng Zhang\",\n      \"Zhiyun Qian\"\n    ],\n    \"toolurl\": \"https://github.com/seclab-ucr/SyzGen_setup\",\n    \"title\": \"SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3460120.3484564\"\n    ]\n  },\n  {\n    \"name\": \"SyzTrust\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"author\": [\n      \"Qinying Wang\",\n      \"Boyu Chang\",\n      \"Shouling Ji\",\n      \"Yuan Tian\",\n      \"Xuhong Zhang\",\n      \"Binbin Zhao\",\n      \"Gaoning Pan\",\n      \"Chenyang Lyu\",\n      \"Mathias Payer\",\n      \"Wenhai Wang\",\n      \"Raheem Beyah\"\n    ],\n    \"toolurl\": \"https://github.com/SyzTrust/syztrust\",\n    \"title\": \"SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://hexhive.epfl.ch/publications/files/24Oakland.pdf\"\n    ]\n  },\n  {\n    \"name\": \"T-Fuzz\",\n    \"year\": 2018,\n    \"author\": [\n      \"Hui Peng\",\n      \"Yan Shoshitaishvili\",\n      \"Mathias Payer\"\n    ],\n    \"title\": \"T-Fuzz: Fuzzing by Program Transformation\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"toolurl\": \"https://github.com/HexHive/T-Fuzz\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/abstract/document/8418632\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"T-Reqs\",\n    \"year\": 2021,\n    \"author\": [\n      \"Bahruz Jabiyev\",\n      \"Steven Sprecher\",\n      \"Kaan Onarlioglu\",\n      \"Engin Kirdah\"\n    ],\n    \"title\": \"T-Reqs: HTTP Request Smuggling with Differential Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://seclab.nu/static/publications/ccs2021treqs.pdf\"\n    ],\n    \"toolurl\": \"https://github.com/bahruzjabiyev/t-reqs-http-fuzzer\",\n    \"targets\": [\n      \"HTTP request\"\n    ],\n    \"references\": [\n      \"Nautilus\",\n      \"DifFuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"TEEzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Marcel Busch\",\n      \"Aravind Machiry\",\n      \"Chad Spensky\",\n      \"Giovanni Vigna\",\n      \"Christopher Kruegel\",\n      \"Mathias Payer\"\n    ],\n    \"toolurl\": \"https://github.com/HexHive/teezz-fuzzer\",\n    \"title\": \"TEEzz: Fuzzing Trusted Applications on COTS Android Devices\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"PartEmu\"\n    ],\n    \"miscurl\": [\n      \"https://hexhive.epfl.ch/publications/files/23Oakland.pdf\"\n    ],\n    \"keywords\": [\n      \"Android\",\n      \"TEE\"\n    ]\n  },\n  {\n    \"name\": \"TEFuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Web\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Yudo Zhao\",\n      \"Yuan Zhang\",\n      \"Min Yang\"\n    ],\n    \"toolurl\": \"https://github.com/seclab-fudan/TEFuzz/\",\n    \"title\": \"Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-zhao-yudi.pdf\"\n    ],\n    \"keywords\": [\n      \"Template engines\"\n    ]\n  },\n  {\n    \"name\": \"TFuzz\",\n    \"year\": 2014,\n    \"author\": [\n      \"William Johansson\",\n      \"Martin Svensson\",\n      \"Ulf E. Larson\",\n      \"Magnus Almgren\",\n      \"Vincenzo Gulisano\"\n    ],\n    \"title\": \"T-Fuzz: Model-based fuzzing for robustness testing of telecommunication protocols\",\n    \"booktitle\": \"Proceedings of the IEEE International Conference on Software Testing, Verification and Validation\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/abstract/document/6823894\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"references\": [\n      \"KiF\",\n      \"Peach\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"TLS-Attacker\",\n    \"year\": 2016,\n    \"author\": [\n      \"Juraj Somorovsky\"\n    ],\n    \"title\": \"Systematic Fuzzing and Testing of TLS Libraries\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://github.com/RUB-NDS/TLS-Attacker\",\n    \"miscurl\": [\n      \"https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf\"\n    ],\n    \"references\": [\n      \"Ruiter et al.\",\n      \"tlsfuzzer\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"TRRespass\",\n    \"year\": 2020,\n    \"author\": [\n      \"Pietro Frigo\",\n      \"Emanuele Vannacci\",\n      \"Hasan Hassan\",\n      \"Victor van der Veen\",\n      \"Onur Mutlu\",\n      \"Cristiano Giuffrida\",\n      \"Herbert Bos\",\n      \"Kaveh Razavi\"\n    ],\n    \"title\": \"TRRespass: Exploiting the Many Sides of Target Row Refresh\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://download.vusec.net/papers/trrespass_sp20.pdf\"\n    ],\n    \"targets\": [\n      \"RAM\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"TWINFUZZ\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"video decoder\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"Matteo Leonelli\",\n      \"Addison Crump\",\n      \"Meng Wang\",\n      \"Florian Bauckholt\",\n      \"Keno Hassler\",\n      \"Ali Abbasi\",\n      \"Thorsten Holz\"\n    ],\n    \"toolurl\": \"https://github.com/CISPA-SysSec/twinfuzz\",\n    \"title\": \"TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks\",\n    \"booktitle\": \"Network and Distributed System Security Symposium (NDSS) 2025\",\n    \"journal\": \"NDSS\",\n    \"miscurl\": [\n      \"https://dx.doi.org/10.14722/ndss.2025.240526\"\n    ],\n    \"keywords\": [\n      \"differential fuzzing\",\n      \"video stack\",\n      \"hardware acceleration\"\n    ]\n  },\n  {\n    \"name\": \"TaintScope\",\n    \"year\": 2010,\n    \"author\": [\n      \"Tielei Wang\",\n      \"Tao Wang\",\n      \"Guofei Gu\",\n      \"Wei Zou\"\n    ],\n    \"title\": \"TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://ieeexplore.ieee.org/abstract/document/5504701\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"SmartFuzz\",\n      \"BuzzFuzz\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"TensorFuzz\",\n    \"year\": 2019,\n    \"author\": [\n      \"Augustus Odena\",\n      \"Catherine Olsson\",\n      \"David G. Andersen\",\n      \"Ian Goodfellow\"\n    ],\n    \"title\": \"TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing\",\n    \"booktitle\": \"Proceedings of the International Conference on Machine Learning\",\n    \"targets\": [\n      \"AI\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"TheHuzz\",\n    \"year\": 2022,\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Rahul Kande\",\n      \"Addison Crump\",\n      \"Garrett Persyn\",\n      \"Patrick Jauernig\",\n      \"Ahmad-Reza Sadeghi\",\n      \"Aakash Tyagi\",\n      \"Jeyavijayan Rajendran\"\n    ],\n    \"title\": \"TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"DifuzzRTL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-kande.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Thunderkaller\",\n    \"year\": 2023,\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Yang Lan\",\n      \"Di Jin\",\n      \"Zhun Wang\",\n      \"Wende Tan\",\n      \"Zheyu Ma\",\n      \"Chao Zhang\"\n    ],\n    \"title\": \"Thunderkaller: Profiling and Improving the Performance of Syzkaller\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"miscurl\": [\n      \"https://conf.researchr.org/details/ase-2023/ase-2023-papers/119/Thunderkaller-Profiling-and-Improving-the-Performance-of-Syzkaller\"\n    ]\n  },\n  {\n    \"name\": \"Titan\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"author\": [\n      \"Heqing Huang\",\n      \"Peisen Yao\",\n      \"Hung-Chun Chiu\",\n      \"Yiyuan Guo\",\n      \"Charles Zhang\"\n    ],\n    \"toolurl\": \"https://github.com/5hadowblad3/Titan\",\n    \"title\": \"Titan : Efficient Multi-target Directed Greybox Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://5hadowblad3.github.io/files/Oakland24-Titan.pdf\"\n    ]\n  },\n  {\n    \"name\": \"TortoiseFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Yanhao Wang\",\n      \"Xiangkun Jia\",\n      \"Yuwei Liu\",\n      \"Kyle Zeng\",\n      \"Tiffany Bao\",\n      \"Dinghao Wu\",\n      \"Purui Su\"\n    ],\n    \"title\": \"Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2020/02/24422-paper.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"TransferFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"SelectFuzz\"\n    ],\n    \"author\": [\n      \"Siyuan Li\",\n      \"Yuekang Li\",\n      \"Zuxin Chen\",\n      \"Chaopeng Dong\",\n      \"Yongpan Wang\",\n      \"Hong Li\",\n      \"Yongle Chen\",\n      \"Hongsong Zhu \"\n    ],\n    \"toolurl\": \"https://github.com/Siyuan-Li201/TransferFuzz\",\n    \"title\": \"TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability Code\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://doi.org/10.48550/arXiv.2411.18347\"\n    ],\n    \"keywords\": [\n      \"trace-guided\",\n      \"vulnerability verification\"\n    ]\n  },\n  {\n    \"name\": \"Transynther\",\n    \"year\": 2020,\n    \"author\": [\n      \"Daniel Moghimi\",\n      \"Moritz Lipp\",\n      \"Berk Sunar\",\n      \"Michael Schwarz\"\n    ],\n    \"title\": \"Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/vernamlab/Medusa\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20fall_moghimi_prepub.pdf\"\n    ],\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"references\": [\n      \"SpecFuzz\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Triforce\",\n    \"year\": 2016,\n    \"author\": [\n      \"Jesse Hertz\",\n      \"Tim Newsham\"\n    ],\n    \"toolurl\": \"https://github.com/nccgroup/TriforceLinuxSyscallFuzzer\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"TriforceAFL\",\n    \"year\": 2016,\n    \"author\": [\n      \"Jesse Hertz\",\n      \"Tim Newsham\"\n    ],\n    \"toolurl\": \"https://github.com/nccgroup/TriforceAFL\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Trinity\",\n    \"year\": 2006,\n    \"author\": [\n      \"Dave Jones\"\n    ],\n    \"toolurl\": \"https://github.com/kernelslacker/trinity\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"Trippel et al.\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Firmware\",\n      \"CPU\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Timothy Trippel\",\n      \"Kang G. Shin\",\n      \"Alex Chernyakhovsky\",\n      \"Garret Kelly\",\n      \"Dominic Rizzo\",\n      \"Matthew Hicks\"\n    ],\n    \"title\": \"Fuzzing Hardware Like Software\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec22-trippel.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Truman\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Morphuzz\"\n    ],\n    \"author\": [\n      \"Zheyu Ma\",\n      \"Qiang Liu\",\n      \"Zheming Li\",\n      \"Tingting Yin\",\n      \"Wende Tan\",\n      \"Chao Zhang\",\n      \"Mathias Payer\"\n    ],\n    \"title\": \"Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"miscurl\": [\n      \"https://www.ndss-symposium.org/wp-content/uploads/2025-301-paper.pdf\"\n    ]\n  },\n  {\n    \"name\": \"UAFL\",\n    \"year\": 2020,\n    \"author\": [\n      \"Haijun Wang\",\n      \"Xiaofei Xie\",\n      \"Yi Li\",\n      \"Cheng Wen\",\n      \"Yuekang Li\",\n      \"Yang Liu\",\n      \"Shengchao Qin\",\n      \"Hongxu Chen\",\n      \"Yulei Sui\"\n    ],\n    \"title\": \"Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"USBFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Hui Peng\",\n      \"Mathias Payer\"\n    ],\n    \"title\": \"USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/HexHive/USBFuzz\",\n    \"miscurl\": [\n      \"https://nebelwelt.net/publications/files/20SEC3.pdf\"\n    ],\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"syzkaller\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Unicorefuzz\",\n    \"year\": 2019,\n    \"author\": [\n      \"Dominik Maier\",\n      \"Benedikt Radtke\",\n      \"Bastian Harren\"\n    ],\n    \"toolurl\": \"https://github.com/fgsect/unicorefuzz.git\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/woot19-paper_maier.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\",\n    \"title\": \"Unicorefuzz:On the Viability of Emulation for Kernelspace Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Workshop on Offensive Technologies\"\n  },\n  {\n    \"name\": \"V-SHUTTLE\",\n    \"year\": 2021,\n    \"author\": [\n      \"Gaoning Pan\",\n      \"Xingwei Lin\",\n      \"Xuhong Zhang\",\n      \"Yongkang Jia\",\n      \"Shouling Ji\",\n      \"Chunming Wu\",\n      \"Xinlei Ying\",\n      \"Jiashui Wang\",\n      \"Yanjun Wu\"\n    ],\n    \"title\": \"V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Fuzzing\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"toolurl\": \"https://github.com/hustdebug/v-shuttle\",\n    \"miscurl\": [\n      \"https://nesa.zju.edu.cn/download/pgn_pdf_V-SHUTTLE.pdf\"\n    ],\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"VD-GUARD\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"Morphuzz\",\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Yuwei Liu\",\n      \"Siqi Chen\",\n      \"Yuchong Xie\",\n      \"Yanhao Wang\",\n      \"Libo Chen\",\n      \"Bin Wang\",\n      \"Yingming Zeng\",\n      \"Zhi Xue\",\n      \"Purui Su\"\n    ],\n    \"title\": \"VD-GUARD: DMA Guided Fuzzing for Hypervisor Virtual Device\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\"\n  },\n  {\n    \"name\": \"VOAPI2\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"API\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"RESTler\"\n    ],\n    \"author\": [\n      \"Wenlong Du\",\n      \"Jian Li\",\n      \"Yanhao Wang\",\n      \"Libo Chen\",\n      \"Ruijie Zhao\",\n      \"Junmin Zhu\",\n      \"Zhengguang Han\",\n      \"Yijun Wang\",\n      \"Zhi Xue\"\n    ],\n    \"toolurl\": \"https://github.com/NSSL-SJTU/VoAPI2\",\n    \"title\": \"VOAPI2: Vulnerability-oriented Testing for RESTful APIs\",\n    \"booktitle\": \"Proceedings of the 33rd USENIX Security Symposium\",\n    \"journal\": \"USENIX Security\",\n    \"miscurl\": [\n      \"https://www.usenix.org/conference/usenixsecurity24/presentation/du\"\n    ],\n    \"keywords\": [\n      \"restful api\",\n      \"stateful fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"VUzzer\",\n    \"year\": 2017,\n    \"author\": [\n      \"Sanjay Rawat\",\n      \"Vivek Jain\",\n      \"Kumar Ashish\",\n      \"Lucian Cojocar\",\n      \"Cristiano Giuffrida\",\n      \"Herbert Bos\"\n    ],\n    \"title\": \"VUzzer: Application-aware Evolutionary Fuzzing\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/vusec/vuzzer\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"Verite\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"Smart Contract\"\n    ],\n    \"color\": \"blackbox\",\n    \"references\": [\n      \"ItyFuzz\"\n    ],\n    \"author\": [\n      \"Ziqiao Kong\",\n      \"Cen Zhang\",\n      \"Maoyi Xie\",\n      \"Ming Hu\",\n      \"Yue Xue\",\n      \"Ye Liu\",\n      \"Haijun Wang\",\n      \"Yang Liu\"\n    ],\n    \"toolurl\": \"https://github.com/wtdcode/verite\",\n    \"title\": \"Smart Contract Fuzzing Towards Profitable Vulnerabilities\",\n    \"miscurl\": [\n      \"https://doi.org/10.1145/3715720\"\n    ]\n  },\n  {\n    \"name\": \"ViDezzo\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Hypervisor\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Qiang Liu\",\n      \"Flavio Toffalini\",\n      \"Yajin Zhou\",\n      \"Mathias Payer\"\n    ],\n    \"toolurl\": \"https://github.com/HexHive/ViDeZZo\",\n    \"title\": \"VIDEZZO: Dependency-aware Virtual Device Fuzzing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"LibFuzzer\",\n      \"V-SHUTTLE\"\n    ],\n    \"miscurl\": [\n      \"https://nebelwelt.net/files/23Oakland4.pdf\"\n    ],\n    \"keywords\": [\n      \"Device fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"VirtFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"author\": [\n      \"Sonke Huster\",\n      \"Matthias Hollick\",\n      \"Jiska Classen\"\n    ],\n    \"toolurl\": \"https://github.com/seemoo-lab/VirtFuzz\",\n    \"title\": \"To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.uni-goettingen.de/de/document/download/6b0d1e9d8e2fb7f57cc1a2fab1b071e7.pdf/huster_S&P24.pdf\"\n    ],\n    \"keywords\": [\n      \"VirtIO\"\n    ]\n  },\n  {\n    \"name\": \"WAFLGo\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Yi Xiang\",\n      \"Xuhong Zhang\",\n      \"Peiyu Liu\",\n      \"Shouling Ji\",\n      \"Xiao Xiao\",\n      \"Hong Liang\",\n      \"Jiacheng Xu\",\n      \"Wenhai Wang\"\n    ],\n    \"toolurl\": \"https://github.com/NESA-Lab/WAFLGo\",\n    \"title\": \"Critical Code Guided Directed Greybox Fuzzing for Commits\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"AFLGo\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-xiang-yi.pdf\"\n    ]\n  },\n  {\n    \"name\": \"WINFUZZ\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Leo Stone\",\n      \"Rishi Ranjan\",\n      \"Stefan Nagy\",\n      \"Matthew Hicks\"\n    ],\n    \"title\": \"No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"WINNIE\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-stone.pdf\"\n    ]\n  },\n  {\n    \"name\": \"WINNIE\",\n    \"year\": 2021,\n    \"author\": [\n      \"Jinho Jung\",\n      \"Stephen Tong\",\n      \"Hong Hu\",\n      \"Jungwon Lim\",\n      \"Yonghwi Jin\",\n      \"Taesoo Kim\"\n    ],\n    \"title\": \"WINNIE: Fuzzing Windows Applications with Harness Synthesis and Fast Cloning\",\n    \"booktitle\": \"Proceedings of the Network and Distributed System Security Symposium\",\n    \"toolurl\": \"https://github.com/sslab-gatech/winnie\",\n    \"miscurl\": [\n      \"https://huhong789.github.io/papers/winnie-ndss2021.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"keywords\": [\n      \"GUI\",\n      \"Windows\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"WhisperFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"CPU\"\n    ],\n    \"color\": \"whitebox\",\n    \"author\": [\n      \"Pallavi Borkar\",\n      \"Chen Chen\",\n      \"Mohamadreza Rostami\",\n      \"Nikhilesh Singh\",\n      \"Rahul Kande\",\n      \"Ahmad-Reza Sadeghi\",\n      \"Chester Rebeiro\",\n      \"Jeyavijayan Rajendran\"\n    ],\n    \"title\": \"WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"HyPFuzz\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-borkar.pdf\"\n    ]\n  },\n  {\n    \"name\": \"WindRanger\",\n    \"year\": 2022,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Zhengjie Du\",\n      \"Yuekang Li\",\n      \"Yang Liu\",\n      \"Bing Mao\"\n    ],\n    \"title\": \"WindRanger: A Directed Greybox Fuzzer driven by DeviationBasic Blocks\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://sites.google.com/view/windrange-directed-fuzzing\"\n    ]\n  },\n  {\n    \"name\": \"WingFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Mingzhe Wang\",\n      \"Jie Liang\",\n      \"Chijin Zhou\",\n      \"Zhiyong Wu\",\n      \"Jingzhou Fu\",\n      \"Zhuo Su\",\n      \"Qing Liao\",\n      \"Bin Gu\",\n      \"Bodong Wu\",\n      \"Yu Jiang\"\n    ],\n    \"toolurl\": \"https://github.com/THU-WingTecher/wingfuzz\",\n    \"title\": \"Data Coverage for Guided Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-wang-mingzhe.pdf\"\n    ]\n  },\n  {\n    \"name\": \"Witcher\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Web\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Erik Trickel\",\n      \"Fabio Pagani\",\n      \"Chang Zhu\",\n      \"Lukas Dresel\",\n      \"Giovanni Vigna\",\n      \"Christopher Kruegel\",\n      \"Ruoyu Wang\",\n      \"Tiffany Bao\",\n      \"Yan Shoshitaishvili\",\n      \"Adam Doupe\"\n    ],\n    \"toolurl\": \"https://github.com/sefcom/Witcher\",\n    \"title\": \"Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"references\": [\n      \"Doupé et al.\"\n    ],\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2023/933600a116/1He7XPiaynS\"\n    ]\n  },\n  {\n    \"name\": \"WuppieFuzz\",\n    \"year\": 2024,\n    \"author\": [\n      \"Thomas Rooijakkers\",\n      \"Erieke Weitenberg\",\n      \"Jelle Nauta\"\n    ],\n    \"toolurl\": \"https://github.com/TNO-S3/WuppieFuzz\",\n    \"miscurl\": [\n      \"https://emagazine.one-conference.nl/2024/finally-validate-your-publicly-exposed-interfaces-with-ease/\"\n    ],\n    \"targets\": [\n      \"API\"\n    ],\n    \"references\": [\n      \"LibAFL\"\n    ],\n    \"keywords\": [\n      \"REST API\",\n      \"coverage-guided\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"YARPGen\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Vsevolod Livinskii\",\n      \"Dmitry Babokin\",\n      \"John Regehr\"\n    ],\n    \"toolurl\": \"https://github.com/intel/yarpgen\",\n    \"title\": \"Fuzzing Loop Optimizations in Compilers for C++ and Data-Parallel Languages\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"references\": [\n      \"CSmith\"\n    ],\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3591295\"\n    ]\n  },\n  {\n    \"name\": \"ZAFL\",\n    \"year\": 2021,\n    \"author\": [\n      \"Stefan Nagy\",\n      \"Anh Nguyen-Tuong\",\n      \"Jason D. Hiser\",\n      \"Jack W. Davidson\",\n      \"Matthew Hicks\"\n    ],\n    \"title\": \"Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec21fall-nagy.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"ZTaint-Havoc\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL++\"\n    ],\n    \"author\": [\n      \"Yuchong Xie\",\n      \"Wenhui Zhang\",\n      \"Dongdong She\"\n    ],\n    \"toolurl\": \"https://github.com/Yu3H0/ZTaint-Havoc\",\n    \"title\": \"ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://doi.org/10.1145/3728916\"\n    ],\n    \"keywords\": [\n      \"Taint Inference\"\n    ]\n  },\n  {\n    \"name\": \"Zeror\",\n    \"year\": 2020,\n    \"author\": [\n      \"Chijinn Zhou\",\n      \"Mingzhe Wang\",\n      \"Jie Liang\",\n      \"Zhe Liu\",\n      \"Yu Jiang\"\n    ],\n    \"title\": \"Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling\",\n    \"booktitle\": \"Proceedings of the International Conference on Automated Software Engineering\",\n    \"miscurl\": [\n      \"http://www.wingtecher.com/themes/WingTecherResearch/assets/papers/ase20.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"MOPT\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"antiparser\",\n    \"year\": 2005,\n    \"author\": [\n      \"David McKinney\"\n    ],\n    \"toolurl\": \"http://antiparser.sourceforge.net/\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"autofz\",\n    \"year\": 2023,\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Yu-Fu Fu\",\n      \"Jaehyuk Lee\",\n      \"Taesoo Kim\"\n    ],\n    \"toolurl\": \"https://github.com/sslab-gatech/autofz\",\n    \"title\": \"autofz: Automated Fuzzer Composition at Runtime\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"EnFuzz\",\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-fu-yu-fu.pdf\"\n    ]\n  },\n  {\n    \"name\": \"boofuzz\",\n    \"year\": 2016,\n    \"author\": [\n      \"Joshua Pereyda\"\n    ],\n    \"title\": \"Fuzzing for Humans: Real Fuzzing in the Real World\",\n    \"booktitle\": \"Proceedings of DefCon\",\n    \"toolurl\": \"https://github.com/jtpereyda/boofuzz\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"references\": [\n      \"Sulley\",\n      \"fuzzowski\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"classfuzz\",\n    \"year\": 2016,\n    \"author\": [\n      \"Yuting Chen\",\n      \"ChenTing Su\",\n      \"Chengnian Sun\",\n      \"SunZhendong Su\",\n      \"Jianjun Zhao\"\n    ],\n    \"title\": \"Coverage-Directed Differential Testing of JVM Implementations\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"miscurl\": [\n      \"https://tingsu.github.io/files/pldi_jvm.pdf\",\n      \"https://github.com/fengjixuchui/FuzzingPaper/blob/master/Paper/PLDI16_JVM.pptx\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"classming\",\n    \"year\": 2019,\n    \"author\": [\n      \"Yuting Chen\",\n      \"Ting Su\",\n      \"Zhendong Su\"\n    ],\n    \"title\": \"Deep Differential Testing of JVM Implementations\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"miscurl\": [\n      \"https://tingsu.github.io/files/icse19-classming.pdf\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"classfuzz\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"cross_fuzz\",\n    \"year\": 2010,\n    \"author\": [\n      \"Michał Zalewski\"\n    ],\n    \"toolurl\": \"http://lcamtuf.coredump.cx/cross_fuzz/\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"ref_fuzz\"\n    ],\n    \"miscurl\": [\n      \"http://lcamtuf.coredump.cx/cross_fuzz/fuzzer_timeline.txt\"\n    ],\n    \"color\": \"blackbox\",\n    \"keywords\": [\n      \"DOM\"\n    ]\n  },\n  {\n    \"name\": \"dtls-fuzzer\",\n    \"year\": 2020,\n    \"author\": [\n      \"Paul Fiterău-Broştean\",\n      \"Bengt Jonsson\",\n      \"Robert Merget\",\n      \"Joeri de Ruiter\",\n      \"Konstantinos Sagonas\",\n      \"Juraj Somorovsky\"\n    ],\n    \"title\": \"Analysis of DTLS Implementations Using Protocol State Fuzzing\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/sec20-fiterau-brostean.pdf\"\n    ],\n    \"toolurl\": \"https://github.com/assist-project/dtls-fuzzer/\",\n    \"references\": [\n      \"TLS-Attacker\"\n    ],\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"fAmulet\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"L2 protocol\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Zihao Li\",\n      \"Xinghao Peng\",\n      \"Zheyuan He\",\n      \"Xiapu Luo\",\n      \"Ting Chen\"\n    ],\n    \"title\": \"fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Computer and Communications Security\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3658644.3690243\"\n    ],\n    \"references\": [\n      \"LOKI\",\n      \"Fluffy\"\n    ],\n    \"keywords\": [\n      \"Polygon zkRollup\",\n      \"blockchain\",\n      \"zero-knowledge L2 protocols\"\n    ]\n  },\n  {\n    \"name\": \"fsfuzzer\",\n    \"year\": 2006,\n    \"author\": [\n      \"LMH\",\n      \"Steve Grubb\",\n      \"Ilja van Sprundel\",\n      \"Eric Sandeen\",\n      \"Jarod Wilson\"\n    ],\n    \"toolurl\": \"https://github.com/sughodke/fsfuzzer\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"fuzzowski\",\n    \"year\": 2019,\n    \"author\": [\n      \"Mario Rivas\"\n    ],\n    \"title\": \"Why You Should Fear Your mundane Office Equipment\",\n    \"booktitle\": \"Proceedings of DefCon\",\n    \"toolurl\": \"https://github.com/nccgroup/fuzzowski\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"references\": [\n      \"boofuzz\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"go-fuzz\",\n    \"year\": 2015,\n    \"author\": [\n      \"Dmitry Vyukov\"\n    ],\n    \"toolurl\": \"https://github.com/dvyukov/go-fuzz\",\n    \"references\": [\n      \"LibFuzzer\"\n    ],\n    \"targets\": [\n      \"Lib\"\n    ],\n    \"miscurl\": [\n      \"https://github.com/dvyukov/go-fuzz/tree/master/slides\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"harbian-qa\",\n    \"year\": 2018,\n    \"author\": [\n      \"HardenedLinux\"\n    ],\n    \"toolurl\": \"https://github.com/hardenedlinux/harbian-qa\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"syzkaller\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"honggfuzz\",\n    \"year\": 2010,\n    \"author\": [\n      \"Robert Swiecki\",\n      \"Felix Gröbert\"\n    ],\n    \"toolurl\": \"https://github.com/google/honggfuzz\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"EFS\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"jFuzz\",\n    \"year\": 2009,\n    \"author\": [\n      \"Karthick Jayaraman\",\n      \"David Harvison\",\n      \"Vijay Ganesh\",\n      \"Adam Kiezun\"\n    ],\n    \"title\": \"jFuzz: A Concolic Whitebox Fuzzer for Java\",\n    \"booktitle\": \"Proceedings of the First NASA Forma Methods Symposium\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"SAGE\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"jsfunfuzz\",\n    \"year\": 2007,\n    \"author\": [\n      \"Window Snyder\",\n      \"Mike Shaver\",\n      \"Jesse Ruderman\"\n    ],\n    \"title\": \"Building and Breaking the BrowserWindow Snyder\",\n    \"toolurl\": \"https://github.com/MozillaSecurity/funfuzz\",\n    \"booktitle\": \"Proceedings of the Black Hat USA\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\",\n    \"keywords\": [\n      \"JavaScript\"\n    ]\n  },\n  {\n    \"name\": \"kAFL\",\n    \"year\": 2017,\n    \"author\": [\n      \"Sergej Schumilo\",\n      \"Cornelius Aschermann\",\n      \"Robert Gawlik\",\n      \"Sebastian Schinzel\",\n      \"Thorsten Holz\"\n    ],\n    \"title\": \"kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"toolurl\": \"https://github.com/RUB-SysSec/kAFL\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-schumilo.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"AFL\",\n      \"syzkaller\",\n      \"Triforce\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"kb-Anonymity\",\n    \"year\": 2011,\n    \"author\": [\n      \"Aditya Budi\",\n      \"David Lo\",\n      \"Lingxiao Jiang\",\n      \"Lucia\"\n    ],\n    \"title\": \"kb-Anonymity: A Model for Anonymized Behavior-Preserving Test and Debugging Data\",\n    \"booktitle\": \"Proceedings of the ACM Conference on Programming Language Design and Implementation\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"references\": [\n      \"jFuzz\"\n    ],\n    \"color\": \"whitebox\"\n  },\n  {\n    \"name\": \"mGPTFuzz\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"IoT\"\n    ],\n    \"color\": \"blackbox\",\n    \"author\": [\n      \"Xiaoyue Ma\",\n      \"Lannan Luo\",\n      \"Qiang Zeng\"\n    ],\n    \"title\": \"From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"references\": [\n      \"HubFuzzer\"\n    ],\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity24-ma-xiaoyue.pdf\"\n    ]\n  },\n  {\n    \"name\": \"mufuzz\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"LibAFL\"\n    ],\n    \"author\": [\n      \"Yongheng Chen\",\n      \"Rui Zhong\",\n      \"Yupeng Yang\",\n      \"Hong Hu\",\n      \"Dinghao Wu\",\n      \"Wenke Lee\"\n    ],\n    \"toolurl\": \"https://github.com/OMH4ck/mufuzz\",\n    \"title\": \"µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture\",\n    \"booktitle\": \"Proceedings of the USENIX Security Symposium\",\n    \"miscurl\": [\n      \"https://www.usenix.org/system/files/usenixsecurity23-chen-yongheng.pdf\"\n    ]\n  },\n  {\n    \"name\": \"orangfuzz\",\n    \"year\": 2013,\n    \"author\": [\n      \"Gary Kwong\"\n    ],\n    \"toolurl\": \"https://github.com/MozillaSecurity/orangfuzz\",\n    \"targets\": [\n      \"UI\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"perf_fuzzer\",\n    \"year\": 2015,\n    \"author\": [\n      \"Vincent M. Weaver\",\n      \"Dave Jones\"\n    ],\n    \"title\": \"perf_fuzzer: Targeted Fuzzing of the perf_event_open() System Call\",\n    \"miscurl\": [\n      \"https://pdfs.semanticscholar.org/a80c/f182c22c5e11d523c8af36732576a1d3d8d4.pdf\"\n    ],\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"Trinity\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"radamsa\",\n    \"year\": 2011,\n    \"author\": [\n      \"Aki Helin\"\n    ],\n    \"toolurl\": \"https://gitlab.com/akihe/radamsa\",\n    \"targets\": [\n      \"File\",\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"ref_fuzz\",\n    \"year\": 2008,\n    \"author\": [\n      \"Michał Zalewski\"\n    ],\n    \"toolurl\": \"http://lcamtuf.coredump.cx/ref_fuzz5.html\",\n    \"miscurl\": [\n      \"http://lcamtuf.coredump.cx/cross_fuzz/fuzzer_timeline.txt\"\n    ],\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"sFuzz\",\n    \"year\": 2020,\n    \"author\": [\n      \"Tai D. Nguyen\",\n      \"Long H. Pham\",\n      \"Jun Sun\",\n      \"Yun Lin\",\n      \"Quang Tran Minh\"\n    ],\n    \"title\": \"sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"targets\": [\n      \"EVM\"\n    ],\n    \"toolurl\": \"https://sfuzz.github.io/\",\n    \"references\": [\n      \"AFL\",\n      \"ContractFuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"syzkaller\",\n    \"year\": 2015,\n    \"author\": [\n      \"Dmitry Vyukov\"\n    ],\n    \"toolurl\": \"https://github.com/dvyukov/syzkaller\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"references\": [\n      \"Trinity\",\n      \"perf_fuzzer\"\n    ],\n    \"color\": \"greybox\"\n  },\n  {\n    \"name\": \"tavor\",\n    \"year\": 2014,\n    \"author\": [\n      \"Markus Zimmermann\"\n    ],\n    \"toolurl\": \"https://github.com/zimmski/tavor\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"tlsfuzzer\",\n    \"year\": 2015,\n    \"author\": [\n      \"Hubert Kario\"\n    ],\n    \"toolurl\": \"https://github.com/tomato42/tlsfuzzer\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"tlspuffin\",\n    \"year\": \"2024\",\n    \"targets\": [\n      \"Network\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"LibAFL\"\n    ],\n    \"author\": [\n      \"Max Ammann\",\n      \"Lucca Hirschi\",\n      \"Steve Kremer\"\n    ],\n    \"toolurl\": \"https://github.com/tlspuffin/tlspuffin\",\n    \"title\": \"DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing\",\n    \"booktitle\": \"Proceedings of the IEEE Symposium on Security and Privacy\",\n    \"miscurl\": [\n      \"https://www.computer.org/csdl/proceedings-article/sp/2024/313000a096/1Ub234bjuWA\"\n    ],\n    \"keywords\": [\n      \"Dolev-Yao Model\"\n    ]\n  },\n  {\n    \"name\": \"xFUZZ\",\n    \"year\": \"2025\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"greybox\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"author\": [\n      \"DongSong Yu\",\n      \"Yiyi Wang\",\n      \"Chao Zhang\",\n      \"Yang Lan\",\n      \"Zhiyuan Jiang\",\n      \"Shuitao Gan\",\n      \"Zheyu Ma\",\n      \"Wende Tan\"\n    ],\n    \"title\": \"xFUZZ: A Flexible Framework for Fine-Grained, Runtime-Adaptive Fuzzing Strategy Composition\",\n    \"booktitle\": \"Proceedings of the International Symposium on Software Testing and Analysis\",\n    \"miscurl\": [\n      \"https://dl.acm.org/doi/pdf/10.1145/3728873\"\n    ]\n  },\n  {\n    \"name\": \"zzuf\",\n    \"year\": 2004,\n    \"author\": [\n      \"Sam Hocevar\"\n    ],\n    \"toolurl\": \"https://github.com/samhocevar/zzuf\",\n    \"targets\": [\n      \"File\"\n    ],\n    \"color\": \"blackbox\"\n  },\n  {\n    \"name\": \"𝜇AFL\",\n    \"year\": 2022,\n    \"targets\": [\n      \"Firmware\"\n    ],\n    \"color\": \"greybox\",\n    \"author\": [\n      \"Wenqiang Li\",\n      \"Jiameng Shi\",\n      \"Fengjun Li\",\n      \"Jingqiang Lin\",\n      \"Wei Wang\",\n      \"Le Guan\"\n    ],\n    \"toolurl\": \"https://github.com/MCUSec/microAFL\",\n    \"title\": \"𝜇AFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware\",\n    \"booktitle\": \"Proceedings of the International Conference on Software Engineering\",\n    \"references\": [\n      \"AFL\"\n    ],\n    \"miscurl\": [\n      \"https://arxiv.org/pdf/2202.03013.pdf\"\n    ]\n  }\n]\n"
  },
  {
    "path": "index.html",
    "content": "<!doctype html>\n<html>\n  <head>\n    <meta charset=\"utf-8\">\n    <meta name=\"viewport\"\n          content=\"width=device-width, initial-scale=1, shrink-to-fit=no\">\n    <meta name=\"description\" content=\"Genealogy database of fuzzers originated from the paper: `The Art, Science, and Engineering of Fuzzing: A Survey`.\">\n\n    <!-- Google / Search Engine Tags -->\n    <meta itemprop=\"name\" content=\"Fuzzing Survey\">\n    <meta itemprop=\"description\" content=\"Genealogy database of fuzzers originated from the paper: `The Art, Science, and Engineering of Fuzzing: A Survey`.\">\n    <meta itemprop=\"image\" content=\"https://fuzzing-survey.org/images/screenshot.png\">\n\n    <!-- Facebook Meta Tags -->\n    <meta property=\"og:url\" content=\"https://fuzzing-survey.org\">\n    <meta property=\"og:type\" content=\"website\">\n    <meta property=\"og:title\" content=\"Fuzzing Survey\">\n    <meta property=\"og:description\" content=\"Genealogy database of fuzzers originated from the paper: `The Art, Science, and Engineering of Fuzzing: A Survey`.\">\n    <meta property=\"og:image\" content=\"https://fuzzing-survey.org/images/screenshot.png\">\n\n    <!-- Twitter Meta Tags -->\n    <meta name=\"twitter:card\" content=\"summary_large_image\">\n    <meta name=\"twitter:title\" content=\"Fuzzing Survey\">\n    <meta name=\"twitter:description\" content=\"Genealogy database of fuzzers originated from the paper: `The Art, Science, and Engineering of Fuzzing: A Survey`.\">\n    <meta name=\"twitter:image\" content=\"https://fuzzing-survey.org/images/screenshot.png\">\n\n    <title>Fuzzing Survey</title>\n    <link rel=\"stylesheet\" href=\"css/bootstrap.min.css\" />\n    <link rel=\"stylesheet\" href=\"css/font-awesome.min.css\" />\n    <link rel=\"stylesheet\" href=\"css/asefuzz.css\" />\n  </head>\n  <body>\n    <header>\n      <nav class=\"navbar navbar-expand-sm navbar-dark bg-dark\">\n        <a class=\"navbar-brand\" href=\"#\">Fuzzing Survey</a>\n        <div class=\"searchform\">\n          <input class=\"form-control\" type=\"search\" value=\"\" autofocus\n                 id=\"js-searchform-text\"\n                 placeholder=\"Type keywords\" />\n          <ul class=\"list-group searchform__result\" id=\"js-searchform-result\">\n            <!-- li class=\"list-group-item py-1\">AAA</li-->\n          </ul>\n        </div>\n        <button class=\"navbar-toggler\" type=\"button\" data-toggle=\"collapse\"\n                data-target=\"#navbar-collapse\"\n                aria-controls=\"navbar-collapse\"\n                aria-expanded=\"false\"\n                aria-label=\"Toggle navigation\">\n          <span class=\"navbar-toggler-icon\"></span>\n        </button>\n        <div class=\"collapse navbar-collapse\" id=\"navbar-collapse\">\n          <ul class=\"nav navbar-nav ml-auto\">\n            <li class=\"nav-item\">\n              <a href=\"#\" class=\"nav-link\" data-toggle=\"modal\"\n                 data-target=\"#js-stats-dialog\">Show Stats</a>\n            </li>\n            <li class=\"nav-item\">\n              <a class=\"nav-link\"\n                 href=\"https://github.com/SoftSec-KAIST/Fuzzing-Survey\">\n                Want to Contribute?</a>\n            </li>\n          </ul>\n        </div>\n      </nav>\n    </header>\n\n    <main role=\"main\" class=\"main\">\n      <div class=\"canvas\" id=\"js-canvas\"></div>\n      <div class=\"separator\" id=\"js-separator\"></div>\n      <div class=\"infobox\" id=\"js-infobox\">\n        <div class=\"infobox__header\" id=\"js-infobox-header\">\n          <h4 id=\"js-infobox-title\">Select a fuzzer</h4>\n        </div>\n        <div id=\"js-infobox-content\"></div>\n        <div class=\"infobox__close\">\n          <button id=\"js-infobox-close\">Close</button>\n        </div>\n      </div>\n    </main>\n\n    <footer class=\"footer py-3 fixed-bottom\">\n      <div class=\"container text-center\">\n        <span class=\"text-muted\">\n          This site is maintained by\n          <a href=\"https://softsec.kaist.ac.kr\">SoftSec Lab.</a> and\n          <a href=\"http://csrc.kaist.ac.kr\">CSRC</a>, KAIST.\n        </span>\n      </div>\n    </footer>\n\n    <div class=\"modal fade\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\"\n         id=\"js-stats-dialog\">\n      <div class=\"modal-dialog modal-lg\">\n        <div class=\"modal-content\">\n          <div class=\"modal-header\">\n            <h5 class=\"modal-title\">Fuzzers Stats</h5>\n            <button type=\"button\" class=\"close\"\n                    data-dismiss=\"modal\" aria-label=\"Close\">\n              <span aria-hidden=\"true\">&times;</span>\n            </button>\n          </div>\n          <div class=\"modal-body\" id=\"js-stats-body\">\n            <div class=\"container\">\n              <div id=\"js-stats-body__summary\">\n                <p>\n                  You can see here all the fuzzers in our DB, and can use\n                  specific keyword(s) you are interested in to filter out the entries\n                  in the lists. Our DB includes fuzzers published in top-tier\n                  venues. To see more detailed inclusion criteria, please see\n                  <a href=\"https://github.com/SoftSec-KAIST/Fuzzing-Survey/blob/master/CONTRIBUTING.md\">this</a>.\n                </p>\n              </div>\n              <div class=\"pb-3\">\n                <input type=\"search\" class=\"stats-body__filter\"\n                       id=\"js-stats-body__filter\"\n                       placeholder=\"Filter\" />\n              </div>\n              <div class=\"row\">\n                <div class=\"col-sm\">\n                  <h5>Venues (# of fuzzers)</h5>\n                  <div class=\"accordion\" id=\"js-stats-body__venues\"\n                       role=\"tablist\" aria-multiselectable=\"true\">\n                  </div>\n                </div>\n              </div>\n              <div class=\"row space-top\">\n                <div class=\"col-sm\">\n                  <h5>Target kinds (# of fuzzers)</h5>\n                  <div class=\"accordion\" id=\"js-stats-body__targets\"\n                       role=\"tablist\" aria-multiselectable=\"true\">\n                  </div>\n                </div>\n                <div class=\"col-sm\">\n                  <h5>Authors (# of fuzzers)</h5>\n                  <div class=\"accordion\" id=\"js-stats-body__authors\"\n                       role=\"tablist\" aria-multiselectable=\"true\">\n                  </div>\n                </div>\n              </div>\n            </div>\n          </div>\n        </div>\n      </div>\n    </div>\n\n    <script src=\"js/jquery.min.js\"></script>\n    <script src=\"js/jquery-ui.min.js\"></script>\n    <script src=\"js/bootstrap.bundle.min.js\"></script>\n    <script src=\"js/d3.min.js\"></script>\n    <script src=\"js/asefuzz.js\"></script>\n  </body>\n</html>\n"
  },
  {
    "path": "js/asefuzz.js",
    "content": "// Art, Science, and Engineering of Fuzzing\n//\n// Copyright (C) 2019 Sang Kil Cha\n//\n// This program comes with ABSOLUTELY NO WARRANTY; for details see COPYING.md.\n// This is free software, and you are welcome to redistribute it under certain\n// conditions; see COPYING.md for details.\n\n\"use strict\";\n\n// When Miller et al. first published the seminal paper.\nconst theFirstYear = 1990;\n\n// The heightr of each year bar.\nconst yearHeight = 100;\n\n// The width of each year bar. Set this value big enough to handle many fuzzers!\nconst yearWidth = 100000;\n\n// The minimum scale that we can set.\nconst minScale = 0.2;\n\n// The currently selected node's name.\nvar currentSelection = undefined;\n\nfunction createCanvas(width, height) {\n  return d3.select(\"#js-canvas\")\n    .append(\"svg\")\n      .attr(\"width\", \"100%\")\n      .attr(\"height\", \"100%\");\n}\n\nfunction parseJSONData(arr) {\n  let dict = {};\n  var data = {\n    \"nodes\": [],\n    \"links\": []\n  };\n  $.each(arr, function (_, obj) {\n    dict[obj.name] = obj;\n    data.nodes.push(obj);\n  });\n  $.each(arr, function (_, obj) {\n    if (obj.references !== undefined) {\n      $.each(obj.references, function (_, ref) {\n        data.links.push({ \"source\": obj.name, \"target\": ref });\n      });\n    }\n  });\n  return data;\n}\n\nfunction drawEdges(g, d) {\n  return g.append(\"g\")\n    .selectAll(\"line\")\n    .data(d.links)\n    .enter()\n    .append(\"line\")\n      .classed(\"link\", true);\n}\n\nfunction buildAuthors(node) {\n  let s = \"\";\n  $.each(node.author, function (i, a) {\n    if (i == node.author.length - 1 && node.author.length > 1)\n      s += \", and \" + a;\n    else s += \", \" + a;\n  });\n  return s;\n}\n\nfunction buildRef(node) {\n  let s = \"\";\n  if (node.title !== undefined) {\n    s += \"\\\"\" + node.title + \"\\\"\";\n  } else {\n    s += \"\\\"\" + node.name + \"\\\"\";\n  }\n  if (node.author !== undefined) {\n    s += buildAuthors(node);\n  }\n  if (node.booktitle !== undefined) {\n    s += \". In \" + node.booktitle;\n  }\n  if (node.journal !== undefined) {\n    s += \". \" + node.journal + \", \" + node.volume + \"(\" + node.number + \")\";\n  }\n  if (node.year !== undefined) {\n    s += \", \" + node.year;\n  }\n  return s;\n}\n\nfunction appendPublicationOrCredit(list, node) {\n  if (node.title !== undefined)\n    list.append(\"li\")\n      .classed(\"list-group-item\", true)\n      .text(buildRef(node));\n  else if (node.author !== undefined)\n    list.append(\"li\")\n      .classed(\"list-group-item\", true)\n      .text(node.name + buildAuthors(node) + \", \" + node.year);\n}\n\nfunction constructIcon(faName, title) {\n  return \"<i class=\\\"fa \" + faName + \"\\\" title = \\\"\" + title + \"\\\"></i> \";\n}\n\nfunction constructCharSpan(ch, title) {\n  return \"<i title = \\\"\" + title + \"\\\">\" + ch + \"</i> \";\n}\n\nfunction appendToolURL(list, node) {\n  const item = list.append(\"li\").classed(\"list-group-item\", true);\n  item.append(\"b\").text(\"Tool URL: \");\n  if (node.toolurl !== undefined)\n    item.append(\"a\")\n      .classed(\"infobox__icon\", true)\n      .attr(\"href\", node.toolurl)\n      .html(constructIcon(\"fa-wrench\", \"Tool available\"));\n  else\n    item.append(\"span\").text(\"Not available.\");\n}\n\nfunction appendTargetInfo(list, node) {\n  const item = list.append(\"li\").classed(\"list-group-item\", true);\n  item.append(\"b\").text(\"Targets: \");\n  if (node.targets !== undefined && node.targets.length > 0)\n    item\n      .selectAll(\"span\")\n      .data(node.targets)\n      .enter()\n        .append(\"span\")\n        .classed(\"infobox__icon\", true)\n        .html(function (target) {\n          switch (target) {\n          case \"file\":\n            return constructIcon(\"fa-file\", \"File fuzzing\");\n          case \"network\":\n            return constructIcon(\"fa-wifi\", \"Network fuzzing\");\n          case \"argument\":\n            return constructCharSpan(\"A\", \"Argument fuzzing\");\n          case \"kernel\":\n            return constructCharSpan(\"K\", \"Kernel fuzzing\");\n          case \"lib\":\n            return constructCharSpan(\"L\", \"Library fuzzing\");\n          default:\n            return \"<i title=\\\"\" + target + \"\\\">\" + target + \"</i> \";\n          }\n        });\n  else\n    item.append(\"span\").text(\"Unknown\");\n}\n\nfunction appendMiscURL(list, node) {\n  const item = list.append(\"li\").classed(\"list-group-item\", true);\n  item.append(\"b\").text(\"Misc. URLs: \");\n  if (node.miscurl !== undefined)\n    $.each(node.miscurl, function (_, url) {\n      item.append(\"a\")\n          .attr(\"href\", url)\n          .classed(\"infobox__icon\", true)\n          .html(constructIcon(\"fa-link\", url));\n    });\n  else\n    item.append(\"span\").text(\"Not available.\");\n}\n\nfunction appendSharableLink(list, node) {\n  const item = list.append(\"li\").classed(\"list-group-item\", true);\n  const url = location.protocol + \"//\" + location.host + location.pathname;\n  item.append(\"b\").text(\"Share: \");\n  item.append(\"a\").attr(\"href\", url + \"?k=\" + node.name)\n    .html(constructIcon(\"fa-share\", node.name));\n}\n\nfunction getPubYear(node) {\n  if (node.year !== undefined) return \" (\" + node.year + \")\";\n  else return \"\";\n}\n\nfunction setTitle(node) {\n  const header = d3.select(\"#js-infobox-header\");\n  if (node === undefined) {\n    d3.select(\"#js-infobox-title\").text(\"Select a fuzzer\");\n  } else {\n    d3.select(\"#js-infobox-title\")\n      .text(\"[\" + node.color + \"] \" + node.name + getPubYear(node));\n  }\n}\n\nfunction clearContents() {\n  return d3.select(\"#js-infobox-content\").html(\"\");\n}\n\nfunction showInfobox() {\n  d3.select(\"#js-infobox\").style(\"display\", \"block\");\n}\n\nfunction hideInfobox() {\n  d3.select(\"#js-infobox\").style(\"display\", \"none\");\n}\n\nfunction onClick(node) {\n  let list = clearContents().append(\"ul\").classed(\"list-group\", true);\n  appendPublicationOrCredit(list, node);\n  appendTargetInfo(list, node);\n  appendToolURL(list, node);\n  appendMiscURL(list, node);\n  appendSharableLink(list, node);\n  setTitle(node);\n  currentSelection = node.name;\n  showInfobox();\n}\n\nfunction drawNodes(g, d, simulation) {\n  const nodes = g.append(\"g\")\n    .selectAll(\"rect\")\n    .data(d.nodes)\n    .enter()\n    .append(\"g\");\n\n  function dragStart(d) {\n    if (!d3.event.active) simulation.alphaTarget(0.3).restart()\n    d.fx = d.x;\n    d.fy = d.y;\n    d.isDragging = true;\n  }\n\n  function dragMiddle(d) {\n    d.fx = d3.event.x;\n    d.fy = d3.event.y;\n  }\n\n  function dragEnd(d) {\n    if (!d3.event.active) simulation.alphaTarget(0);\n    d.fx = null;\n    d.fy = null;\n    d.isDragging = false;\n  }\n\n  nodes.append(\"ellipse\")\n    .attr(\"rx\", 40)\n    .attr(\"ry\", 12)\n    .attr(\"class\", function (d) {\n      switch (d.color) {\n      case \"blackbox\": return \"node node-blackbox\";\n      case \"whitebox\": return \"node node-whitebox\";\n      default: return \"node node-greybox\";\n      }\n    })\n    .on(\"click\", onClick)\n    .call(d3.drag()\n            .on(\"start\", dragStart)\n            .on(\"drag\", dragMiddle)\n            .on(\"end\", dragEnd));\n\n  nodes.append(\"text\")\n    .attr(\"class\", function (d) {\n      switch (d.color) {\n      case \"blackbox\": return \"nodetext nodetext-blackbox\";\n      default: return \"nodetext\";\n      }\n    })\n    .attr(\"dominant-baseline\", \"middle\")\n    .text(function (d) { return d.name })\n    .on(\"click\", onClick);\n\n  const dragHandler = d3.drag()\n    .on(\"start\", dragStart)\n    .on(\"drag\", dragMiddle)\n    .on(\"end\", dragEnd);\n  dragHandler(nodes);\n\n  return nodes;\n}\n\nfunction computeMaxYear(d) {\n  return d.reduce(function (acc, obj) {\n    return Math.max(acc, obj.year);\n  }, theFirstYear);\n}\n\nfunction installZoomHandler(height, canvas, g, d) {\n  const maxX = yearWidth / 4;\n  const maxY = (yearHeight + 2) * (computeMaxYear(d.nodes) - theFirstYear + 1);\n  const marginY = height / 2 / minScale;\n  const zoomHandler =\n    d3.zoom()\n      .scaleExtent([minScale, 5])\n      .translateExtent([[-maxX, -yearHeight - marginY], [maxX, maxY + marginY]])\n      .on(\"zoom\", function () {\n        g.attr(\"transform\", d3.event.transform)\n      });\n  zoomHandler(canvas);\n  return zoomHandler;\n}\n\nfunction fieldMatch(field, re) {\n  if (field !== undefined) return field.match(re);\n  return false;\n}\n\nfunction arrayMatch(targets, re) {\n  if (targets === undefined) return false;\n  for (let i = 0; i < targets.length; i++) {\n    if (fieldMatch(targets[i], re)) return true;\n  }\n  return false;\n}\n\nfunction escapeRegExp(string) {\n  return string.replace(/[.*+\\-?^${}()|[\\]\\\\]/g, '\\\\$&');\n}\n\nfunction clearSearchResults(nodes, resultList) {\n  nodes.select(\".node\").classed(\"node-found\", function (node) {\n    return (currentSelection === node.name);\n  });\n  resultList.html(\"\");\n}\n\nfunction showFuzzer(node, nodes, zoom, canvas, width, height) {\n  const resultList = d3.select(\"#js-searchform-result\");\n  const k = 2.0;\n  const x = - node.x * k + width / 2;\n  const y = - node.y * k + height / 2;\n  onClick(node);\n  clearSearchResults(nodes, resultList);\n  canvas.transition().duration(750)\n    .call(zoom.transform,\n          d3.zoomIdentity.translate(x, y).scale(k));\n}\n\nfunction installSearchHandler(width, height, canvas, zoom, nodes) {\n  const txt = $(\"#js-searchform-text\");\n  const resultList = d3.select(\"#js-searchform-result\");\n  let items = null;\n  let itemidx = -1;\n  function performSearch(s) {\n    const escaped = escapeRegExp(s);\n    const re = new RegExp(escaped, \"i\");\n    itemidx = -1;\n    clearSearchResults(nodes, resultList);\n    if (escaped === \"\") return;\n    const matches = nodes.filter(function (n) {\n      return n.name.match(re)\n        || fieldMatch(n.year.toString(), re)\n        || fieldMatch(n.title, re)\n        || fieldMatch(n.booktitle, re)\n        || fieldMatch(n.journal, re)\n        || arrayMatch(n.targets, re)\n        || arrayMatch(n.keywords, re)\n        || (n.author !== undefined ? fieldMatch(n.author.join(\" \"), re) : false)\n    });\n    matches.select(\".node\").classed(\"node-found\", true);\n    const maxShow = 10;\n    matches.each(function (d, i) {\n      if (i >= maxShow) return;\n      resultList.append(\"li\")\n        .classed(\"list-group-item\", true)\n        .classed(\"py-1\", true)\n        .text(d.name)\n        .on(\"click\", function () {\n          showFuzzer(d, nodes, zoom, canvas, width, height);\n        });\n    });\n  };\n  function getCurrentResult() {\n    return resultList.selectAll(\".list-group-item\")\n        .classed(\"active\", false).nodes();\n  };\n  txt.click(function (e) { clearSearchResults(nodes, resultList); });\n  txt.keydown(function (e) {\n    if (e.key === \"ArrowDown\" || e.key === \"ArrowUp\") return false;\n    else return true;\n  });\n  txt.keyup(function (e) {\n    if (e.shiftKey || e.ctrlKey || e.altKey) return;\n    if (e.key === \"Enter\" || e.keyCode === 13) {\n      if (itemidx >= 0 && itemidx <= items.length - 1) {\n        $(items[itemidx]).trigger(\"click\");\n        itemidx = -1;\n      } else {\n        // TODO: show search results here.\n        console.log(\"TODO\");\n      }\n    } else if (e.key === \"ArrowUp\" || e.keyCode === 38) {\n      items = getCurrentResult();\n      itemidx = Math.max(itemidx - 1, 0);\n      d3.select(items[itemidx]).classed(\"active\", true);\n      return false;\n    } else if (e.key === \"ArrowDown\" || e.keyCode === 40) {\n      items = getCurrentResult();\n      itemidx = Math.min(itemidx + 1, items.length - 1);\n      d3.select(items[itemidx]).classed(\"active\", true);\n      return false;\n    } else {\n      performSearch(txt.val());\n    }\n  });\n}\n\nfunction installClickHandler(nodes) {\n  const resultList = d3.select(\"#js-searchform-result\");\n  $(document).on(\"click\", \"svg\", function (evt) {\n    clearSearchResults(nodes, resultList);\n  });\n}\n\nfunction installDragHandler() {\n  const infobox = d3.select(\"#js-infobox\");\n  $(\"#js-infobox\").resizable({\n    handles: { w: $(\"#js-separator\") },\n    resize: function (_e, ui) {\n      const orig = ui.originalSize.width;\n      const now = ui.size.width;\n      const width = orig + orig - now;\n      infobox.style(\"flex-basis\", width + \"px\");\n      infobox.style(\"width\", null);\n      infobox.style(\"height\", null);\n    }\n  });\n}\n\nfunction installInfoBoxCloseHandler() {\n  $(\"#js-infobox-close\").click(function () { hideInfobox(); });\n}\n\nfunction computeYPos(year) {\n  return (year - theFirstYear) * yearHeight;\n}\n\nfunction ticked(links, nodes, simulation) {\n  return function (e) {\n    nodes.attr(\"transform\", function (d) {\n      if (!d.isDragging) {\n        d.y += (computeYPos(d.year) - d.y) * simulation.alpha();\n      }\n      return \"translate(\" + d.x + \",\" + d.y + \")\";\n    });\n    links\n      .attr(\"x1\", function (d) { return d.source.x; })\n      .attr(\"y1\", function (d) { return d.source.y; })\n      .attr(\"x2\", function (d) { return d.target.x; })\n      .attr(\"y2\", function (d) { return d.target.y; });\n  }\n}\n\nfunction initSimulation(d, simulation, width, height, links, nodes) {\n  simulation\n    .nodes(d.nodes)\n    .force(\"link\",\n           d3.forceLink()\n             .id(function (d) { return d.name; })\n             .strength(function (link) {\n               const diff = Math.abs(link.source.year - link.target.year);\n               if (diff <= 0 ) return 0.5;\n               else return 0.8;\n             }))\n    .force(\"charge\", d3.forceManyBody().strength(-2000).distanceMax(500))\n    .on(\"tick\", ticked(links, nodes, simulation));\n\n  simulation.force(\"link\").links(d.links);\n}\n\nfunction addStatItem(dict, key, id) {\n  if (key in dict) dict[key].push(id);\n  else dict[key] = [ id ];\n}\n\nfunction sortByCount(stats) {\n  const items = Object.keys(stats).map(function (k) { return [k, stats[k]]; });\n  items.sort(function (fst, snd) {\n    const sndLen = snd[1].length;\n    const fstLen = fst[1].length;\n    if (sndLen == fstLen) {\n      return fst[0].localeCompare(snd[0]); // lexicographical sorting\n    } else {\n      return sndLen - fstLen;\n    }\n  });\n  return items;\n}\n\nfunction sortFuzzersByYear(fuzzerMap, fuzzers) {\n  fuzzers.sort(function (fst, snd) {\n    return fuzzerMap[snd].year - fuzzerMap[fst].year;\n  });\n  return fuzzers;\n}\n\nfunction makeAccordionElm(data, handle, myid, header, fuzzers, fnLink) {\n  const card = d3.select(handle)\n                 .append(\"div\").classed(\"card\", true);\n  card\n    .append(\"div\").classed(\"card-header\", true).attr(\"role\", \"tab\")\n    .append(\"h6\").classed(\"mb-0\", true).classed(\"small\", true)\n    .append(\"div\")\n      .attr(\"role\", \"button\")\n      .attr(\"data-toggle\", \"collapse\")\n      .attr(\"data-target\", \"#\" + myid)\n      .html(header);\n  card\n    .append(\"div\").classed(\"collapse\", true).attr(\"id\", myid)\n    .append(\"div\").classed(\"card-body\", true)\n    .append(\"h6\").classed(\"small\", true)\n    .append(\"ul\").classed(\"list-group\", true)\n    .selectAll(\"li\")\n    .data(fuzzers)\n    .enter()\n    .append(\"li\").html(function (f) { return fnLink(f); });\n  return $(card.node()).detach();\n}\n\nfunction fuzzerToString(fuzzer) {\n  let s = fuzzer.name;\n  if (fuzzer.year !== undefined) s += \" \" + fuzzer.year;\n  if (fuzzer.author !== undefined) s += \" \" + fuzzer.author.join();\n  if (fuzzer.title !== undefined) s += \" \" + fuzzer.title;\n  if (fuzzer.booktitle !== undefined) s += \" \" + fuzzer.booktitle;\n  if (fuzzer.targets !== undefined) s += \" \" + fuzzer.targets.join();\n  return s;\n}\n\nfunction makeAnchor(fuzzerMap, f) {\n  const fuzzer = fuzzerMap[f];\n  return \"<a href=\\\"./?k=\" + f + \"\\\">\" + buildRef(fuzzer) + \"</a>\"\n    + \"<span style=\\\"display: none\\\">\"\n    + fuzzerToString(fuzzerMap[f]) + \"</span>\";\n}\n\nfunction makeAccordion(fuzzerMap, data, id, handle) {\n  const stats = [];\n  const sorted = sortByCount(data);\n  sorted.forEach(function (data) {\n    const name = data[0];\n    const fuzzers = data[1];\n    const myid = \"js-\" + id + \"-\" + name.replace(/\\s/g, \"\");\n    const header = name + \" (<span>\" + fuzzers.length + \"</span>)\";\n    const fnLink = function (f) { return makeAnchor(fuzzerMap, f); };\n    stats.push(\n      makeAccordionElm(data, handle, myid, header,\n                       sortFuzzersByYear(fuzzerMap, fuzzers), fnLink));\n  });\n  return stats;\n}\n\nfunction makeVenueAccordion(fuzzerMap, venues) {\n  return makeAccordion(fuzzerMap, venues, \"venue\", \"#js-stats-body__venues\");\n}\n\nfunction makeTargetAccordion(fuzzerMap, targets) {\n  return makeAccordion(fuzzerMap, targets, \"target\", \"#js-stats-body__targets\");\n}\n\nfunction makeAuthorAccordion(fuzzerMap, authors) {\n  return makeAccordion(fuzzerMap, authors, \"author\", \"#js-stats-body__authors\");\n}\n\nfunction filterAndSortAccordion(acc, str, container) {\n  const elms = [];\n  acc.forEach(function (elm) {\n    let matches = 0;\n    elm.find(\"ul > li\").each(function () {\n      const listElm = $(this);\n      const m = listElm.find(\"span:contains('\" + str + \"')\");\n      if (m.length) {\n        matches += 1;\n        $(this).show();\n      }\n    });\n    if (matches > 0) {\n      elms.push([ matches, elm ]);\n      elm.find(\"div > span\").text(matches);\n    }\n  });\n  elms.sort(function (fst, snd) {\n    return snd[0] - fst[0];\n  });\n  elms.forEach(function (elm) {\n    container.append(elm[1]);\n  });\n}\n\nfunction registerStatsFilter(venueAcc, targetAcc, authorAcc) {\n  $(\"#js-stats-body__filter\").on(\"change keyup paste click\", function () {\n    const t = $(this).val();\n    $(\".card li\").each(function () { $(this).hide(); });\n    $(\"#js-stats-body__venues\").empty();\n    $(\"#js-stats-body__targets\").empty();\n    $(\"#js-stats-body__authors\").empty();\n    filterAndSortAccordion(venueAcc, t, $(\"#js-stats-body__venues\"));\n    filterAndSortAccordion(targetAcc, t, $(\"#js-stats-body__targets\"));\n    filterAndSortAccordion(authorAcc, t, $(\"#js-stats-body__authors\"));\n  });\n}\n\nfunction initStats(data) {\n  const fuzzerMap = {};\n  const venues = {};\n  const targets = {};\n  const authors = {};\n  data.forEach(function (v) {\n    fuzzerMap[v.name] = v;\n    if (v.author !== undefined)\n      v.author.forEach(function (a) { addStatItem(authors, a, v.name); });\n    if (v.booktitle !== undefined)\n      addStatItem(venues, v.booktitle, v.name);\n    v.targets.forEach(function (t) { addStatItem(targets, t, v.name); });\n  });\n  d3.select(\"#js-stats-body__summary\").append(\"p\")\n    .text(\"Currently, there are a total of \"\n          + data.length\n          + \" fuzzers and \"\n          + Object.keys(authors).length\n          + \" authors in the DB, collected from \"\n          + Object.keys(venues).length\n          + \" different venues.\");\n  const venueAcc = makeVenueAccordion(fuzzerMap, venues);\n  const targetAcc = makeTargetAccordion(fuzzerMap, targets);\n  const authorAcc = makeAuthorAccordion(fuzzerMap, authors);\n  $.expr[':'].contains = function (n, i, m) {\n    return jQuery(n).text().toUpperCase().indexOf(m[3].toUpperCase()) >= 0;\n  };\n  filterAndSortAccordion(venueAcc, \"\", $(\"#js-stats-body__venues\"));\n  filterAndSortAccordion(targetAcc, \"\", $(\"#js-stats-body__targets\"));\n  filterAndSortAccordion(authorAcc, \"\", $(\"#js-stats-body__authors\"));\n  registerStatsFilter(venueAcc, targetAcc, authorAcc);\n}\n\nfunction getQueryVariable(variable) {\n  var query = window.location.search.substring(1);\n  var vars = query.split('&');\n  for (var i = 0; i < vars.length; i++) {\n    var pair = vars[i].split('=');\n    if (decodeURIComponent(pair[0]) == variable) {\n      return decodeURIComponent(pair[1]);\n    }\n  }\n  return undefined;\n}\n\nd3.json(\"data/fuzzers.json\")\n  .then(function (json) {\n    const width = $(\"#js-canvas\").width();\n    const height = $(\"#js-canvas\").height();\n    const canvas = createCanvas(width, height);\n    const simulation = d3.forceSimulation();\n    const g = canvas.append(\"g\");\n    const d = parseJSONData(json);\n    const links = drawEdges(g, d);\n    const nodes = drawNodes(g, d, simulation);\n    const zoom = installZoomHandler(height, canvas, g, d);\n    installSearchHandler(width, height, canvas, zoom, nodes);\n    installClickHandler(nodes);\n    installDragHandler();\n    installInfoBoxCloseHandler();\n    initSimulation(d, simulation, width, height, links, nodes);\n    initStats(d.nodes);\n    zoom.scaleTo(canvas, minScale);\n    // Center the graph after a sec.\n    hideInfobox();\n    setTimeout(function () {\n      const key = getQueryVariable(\"k\");\n      const data = d.nodes.find(function (d) { return (d.name === key); });\n      if (key === undefined || data === undefined) {\n        const graphScale = d3.zoomTransform(g.node()).k;\n        const y = height / 2 / graphScale;\n        zoom.translateTo(canvas, 0, y);\n      } else {\n        setTimeout(function () {\n          showFuzzer(data, nodes, zoom, canvas, width, height);\n        }, 1000);\n      }\n    }, 500);\n  });\n"
  },
  {
    "path": "script.py",
    "content": "import json\nimport sys\nimport readline\n\nDATA_FILE = 'data/fuzzers.json'\n\n\nclass RefCompleter(object):\n    def __init__(self, options):\n        self.options = sorted(options)\n\n    def complete(self, text, state):\n        if state == 0:\n            if text:\n                self.matches = [\n                    s for s in self.options if s and s.startswith(text)\n                ]\n            else:\n                self.matches = self.options[:]\n\n        try:\n            return self.matches[state]\n        except IndexError:\n            return None\n\n\ndef is_empty_field(field):\n    return field == '' or field == ['']\n\n\ndef is_valid_color(color):\n    return color in ['whitebox', 'blackbox', 'greybox']\n\n\ndef is_valid_references(db, refs):\n    if refs == ['']:\n        return '\\nNo reference.'\n\n    if len(refs) > 2:\n        return '\\nToo many references.'\n\n    names = [e['name'] for e in db]\n    for ref in refs:\n        if ref not in names:\n            return '\\nInvalid reference {}.'.format(ref)\n\n    return None\n\n\n# Load data/fuzzers.json\nwith open(DATA_FILE, 'r') as f:\n    db = json.load(f)\n\n# Initialize readline completer\nif 'libedit' in readline.__doc__:\n    readline.parse_and_bind(\"bind ^I rl_complete\")\nelse:\n    readline.parse_and_bind(\"tab: complete\")\n\n# Required fields\nentry = {}\nentry['name'] = input('name: ')\nif is_empty_field(entry['name']):\n    err = '\\nNo name.'\n    sys.exit(err)\n\nentry['year'] = input('year: ')\nif is_empty_field(entry['year']):\n    err = '\\nNo year.'\n    sys.exit(err)\n\nentry['targets'] = input('targets: ').split(', ')\nif is_empty_field(entry['targets']):\n    err = '\\nNo targets.'\n    sys.exit(err)\n\nentry['color'] = input('color: ')\nif not is_valid_color(entry['color']):\n    sys.exit('\\nInvalid color {}'.format(entry['color']))\n\nreadline.set_completer(RefCompleter([e['name'] for e in db]).complete)\n\nentry['references'] = input('references: ').split(', ')\nerr = is_valid_references(db, entry['references'])\nif err:\n    sys.exit(err)\n\nreadline.set_completer(None)\n\n# Optional fields\nentry['author'] = input('\\nauthor: ').split(', ')\nentry['toolurl'] = input('toolurl: ')\nentry['title'] = input('title: ')\nentry['booktitle'] = input('booktitle: ')\nentry['journal'] = input('journal: ')\nentry['volume'] = input('volumn: ')\nentry['number'] = input('number: ')\n\nentry['miscurl'] = input('miscurl: ').split(', ')\nentry['keywords'] = input('keywords: ').split(', ')\n\n# Clear empty fields and store the result\nentry = {k: v for k, v in entry.items() if not is_empty_field(v)}\ndb.append(entry)\ndb = sorted(db, key=lambda e: e['name'])\nwith open(DATA_FILE, 'w') as f:\n    json.dump(db, f, indent=2, ensure_ascii=False)\n    f.write('\\n')\n\n"
  }
]