<?xml version="1.0" encoding="UTF-8"?><rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcq="http://purl.org/dc/terms/"><records count="1" morepages="false" start="1" end="1"><record rownumber="1"><dc:product_type>Journal Article</dc:product_type><dc:title>Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments</dc:title><dc:creator>Botacin, Marcus</dc:creator><dc:corporate_author>Botacin; TAMU</dc:corporate_author><dc:editor/><dc:description>&lt;p&gt;In real life, distinct runs of the same artifact lead to the exploration of different paths, due to either system’s natural randomness or malicious constructions. These variations might completely change execution outcomes (extreme case). Thus, to analyze malware beyond theoretical models, we must consider the execution of multiple paths. The academic literature presents many approaches for multipath analysis (e.g., fuzzing, symbolic, and concolic executions), but it still fails to answer&lt;italic&gt;What’s the current state of multipath malware tracing?&lt;/italic&gt;This work aims to answer this question and also to point out&lt;italic&gt;What developments are still required to make them practical?&lt;/italic&gt;Thus, we present a literature survey and perform experiments to bridge theory and practice. Our results show that (i) natural variation is frequent; (ii) fuzzing helps to discover more paths; (iii) fuzzing can be guided to increase coverage; (iv) forced execution maximizes path discovery rates; (v) pure symbolic execution is impractical, and (vi) concolic execution is promising but still requires further developments.&lt;/p&gt;</dc:description><dc:publisher>ACM</dc:publisher><dc:date>2024-12-31</dc:date><dc:nsf_par_id>10611833</dc:nsf_par_id><dc:journal_name>Digital Threats: Research and Practice</dc:journal_name><dc:journal_volume>5</dc:journal_volume><dc:journal_issue>4</dc:journal_issue><dc:page_range_or_elocation>1 to 33</dc:page_range_or_elocation><dc:issn>2576-5337</dc:issn><dc:isbn/><dc:doi>https://doi.org/10.1145/3700147</dc:doi><dcq:identifierAwardId>2327427</dcq:identifierAwardId><dc:subject>malware</dc:subject><dc:subject>tracing</dc:subject><dc:subject>fuzzer</dc:subject><dc:subject>symbolic execution</dc:subject><dc:version_number>1.0</dc:version_number><dc:location/><dc:rights/><dc:institution/><dc:sponsoring_org>National Science Foundation</dc:sponsoring_org></record></records></rdf:RDF>