[1] [n.d.]. The Codeproject. https://www.codeproject.com/Articles/88435/SimpleIEEE Press, 115-124. Guide-to-Mathematical-Expression-Parsing. [2] [n.d.]. Home of the International Community interested in Grammatical Inference. inference for computational linguistics. Synthesis Lectures on Human Language https://grammarlearning.org. [3] [n.d.]. JSON Parser. https://github.com/HarryDC/JsonParser. [4] [n.d.]. Lisp Parser. https://hackage.haskell.org/package/lispparser. [5] [n.d.]. Mathematical Expressions Parser. https://github.com/louisfisch/ mathematical-expressions-parser. [6] [n.d.]. Microjson - a minimal JSON parser. https://github.com/phensley/ microjson. [7] [n.d.]. MJS. https://github.com/cesanta/mjs. [8] [n.d.]. TinyC. https://github.com/TinyCC/TinyCC. [9] [n.d.]. URL Lib Parser. https://github.com/python/cpython/blob/3.6/Lib/urllib/ Engineering. ACM, New York, NY, USA, 720-725. parse.py. [10] Dana Angluin. 1987. Learning Regular Sets from Queries and Counterexamples. legacy systems. In International Test Conference, 2003. Proceedings. ITC 2003., Inf. Comput. 75, 2 (Nov. 1987), 87-106. https://doi.org/10.1016/0890-5401(87) Vol. 2. 150-159 Vol.2. https://doi.org/10.1109/TEST.2003.1271205 90052-6 [11] Dana Angluin and Michael Kharitonov. 1995. When Won't Membership Queries Help? J. Comput. System Sci. 50, 2 (1995), 336-355. [12] Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars. In The Network and Distributed System Security Symposium. 135-148. [13] Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek [37] Lukas Kirschner, Ezekiel O. Soremekun, and Andreas Zeller. 2020. Debugging Saxena, Jun Sun, Yang Liu, and Jin Song Dong. 2013. AUTHSCAN: Automatic ExInputs. In International Conference on Software Engineering. ACM. traction of Web Authentication Protocols from Implementations. In The Network [38] Nicolas Laurent and Kim Mens. 2016. Taming context-sensitive languages with and Distributed System Security Symposium. The Internet Society. [14] Osbert Bastani, Rahul Sharma, Alex Aiken, and Percy Liang. 2017. Synthesiz ing Program Input Grammars. In ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, New York, NY, USA, 95-110. [15] Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schu milo, Simon Wörner, and Thorsten Holz. 2019. GRIMOIRE: Synthesizing Structure while Fuzzing. In 28th USENIX Security Symposium (USENIX Secu rity 19). 1985-2002. https://www.syssec.ruhr-uni-bochum.de/media/emma/ veroeffentlichungen/2019/06/03/grimoire.pdf [16] Guillaume Bonfante, Jean-Yves Marion, and Thanh Dinh Ta. 2014. Malware Message Classification by Dynamic Analysis. In Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers (Lecture Notes in Computer Science), Frédéric Cuppens, Joaquín García-Alfaro, A. Nur Zincir-Heywood, and Philip W. L. Fong (Eds.), Vol. 8930. Springer, 112-128. https://doi.org/10.1007/978-3-319-17040-4_8 [17] Sergey Bratus, Lars Hermerschmidt, Sven M. Hallberg, Michael E. Locasto, Falcon Momot, Meredith L. Patterson, and Anna Shubina. 2017. Curing the Vulnerable Parser: Design Patterns for Secure Input Handling. ;login: 42 (2017). [18] Juan Caballero, Heng Yin, Zhenkai Liang, and Dawn Song. 2007. Polyglot: Auto matic Extraction of Protocol Message Format Using Dynamic Binary Analysis. In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 317-329. https://doi.org/10.1145/1315245.1315286 [19] Pierre Chifflier and Geoffroy Couprie. 2017. Writing parsers like it is 2017. In 2017 IEEE Security and Privacy Workshops (SPW). IEEE, 80-92. [20] Paolo Milani Comparetti, Gilbert Wondracek, Christopher Kruegel, and Engin Kirda. 2009. Prospex: Protocol Specification Extraction. In IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, USA, 110-125. https://doi.org/10.1109/SP.2009.14 [21] Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, and Luis Irun-Briz. 2008. Tupni: Automatic Reverse Engineering of Input Formats. In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 391-402. [22] Colin De la Higuera. 2010. Grammatical inference: learning automata and gram mars. Cambridge University Press. [23] Jean-Christophe Deprez and Arun Lakhotia. 2000. A Formalism to Automate Mapping from Program Features to Code.. In IWPC. 69-78. [24] Kexin Pei Dongdong Shi. 2019. NEUZZ: Efficient Fuzzing with Neural Program Smoothing. IEEE S&P (Jan. 2019). http://par.nsf.gov/biblio/10097303 [25] Henning Fernau. 2009. Algorithms for learning regular expressions from positive data. Information and Computation 207, 4 (2009), 521-541. [26] Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, and Konrad Rieck. 2015. Pulsar: Stateful black-box fuzzing of proprietary network protocols. In International Conference on Security and Privacy in Communication Systems. Springer, 330-347. [27] Patrice Godefroid, Adam Kiezun, and Michael Y. Levin. 2008. Grammar-based Whitebox Fuzzing. In ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, New York, NY, USA, 206-215. [28] Patrice Godefroid, Hila Peleg, and Rishabh Singh. 2017. Learn&Fuzz: Machine Learning for Input Fuzzing. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017). IEEE Press, Piscataway, NJ, USA, 50-59. http://dl.acm.org/citation.cfm?id=3155562.3155573 [29] Benedikt Hauptmann, Elmar Juergens, and Volkmar Woinke. 2015. Generating refactoring proposals to remove clones from automated system tests. In Proceed ings of the 2015 IEEE 23rd International Conference on Program Comprehension. [30] Jeffrey Heinz, Colin De la Higuera, and Menno Van Zaanen. 2015. Grammatical Technologies 8, 4 (2015), 1-139. [31] Jeffrey Heinz and José M Sempere. 2016. Topics in grammatical inference. Vol. 465. Springer. [32] Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with Code Fragments. In Proceedings of the 21st USENIX Conference on Security Symposium (Security'12). USENIX Association, Berkeley, CA, USA, 38-38. https://www. usenix.org/system/files/conference/usenixsecurity12/sec12-final73.pdf [33] Matthias Höschele and Andreas Zeller. 2016. Mining Input Grammars from Dynamic Taints. In IEEE/ACM International Conference on Automated Software [34] H. Hungar, T. Margaria, and B. Steffen. 2003. Test-based model generation for [35] Clinton L Jeffery. 2003. Generating LR syntax error messages from examples. ACM Transactions on Programming Languages and Systems (TOPLAS) 25, 5 (2003), 631-640. [36] Trevor Jim and Yitzhak Mandelbaum. 2010. Efficient Earley parsing with regular right-hand sides. Electronic Notes in Theoretical Computer Science 253, 7 (2010), principled stateful parsing. In Proceedings of the 2016 ACM SIGPLAN International Conference on Software Language Engineering. ACM, 15-27. [39] Zhiqiang Lin and Xiangyu Zhang. 2008. Deriving Input Syntactic Structure from Execution. In ACM SIGSOFT Symposium on The Foundations of Software Engineering. ACM, New York, NY, USA, 83-93. [40] Zhiqiang Lin, Xiangyu Zhang, and Dongyan Xu. 2010. Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications. IEEE Reverse Engineering State Machines by Interactive Grammar Inference. In WorkTransactions on Software Engineering 36, 5 (Sept. 2010), 688-703. https://doi.org/ ing Conference on Reverse Engineering. IEEE Computer Society, Washington, DC, 10.1109/TSE.2009.54